Bug 134238 - NetworkManager does not support WPA-Enterprise
Summary: NetworkManager does not support WPA-Enterprise
Status: RESOLVED FIXED
: 141292 (view as bug list)
Alias: None
Product: SUSE Linux 10.1
Classification: openSUSE
Component: Network (show other bugs)
Version: Alpha 4
Hardware: All SuSE Linux 10.1
: P5 - None : Enhancement (vote)
Target Milestone: Beta 6
Assignee: Robert Love
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-11-17 19:06 UTC by Forgotten User ZhJd0F0L3x
Modified: 2006-02-28 15:36 UTC (History)
5 users (show)

See Also:
Found By: Component Test
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
/var/log/messages (46.48 KB, text/plain)
2006-01-12 18:50 UTC, Forgotten User ZhJd0F0L3x
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Forgotten User ZhJd0F0L3x 2005-11-17 19:06:27 UTC
I cannot enable Enterprise-WPA with network manager. Here is what i have done:
-install alpha3
-install ipw-firmware
-yast2, network devices, select ipw2200, click "handled by network manager"
-rcnetworkmanager restart, because networkmanager was gone after yast was finished
-nm-applet
-click the icon in the systray
 - connect to other wireless network
 - enter the essid (is hidden by accesspoint)
 - check "connect with encryption enabled"
 - i can only enter a passphrase, but cannot enter certificates etc. needed for WPA-EAP.
Comment 1 Robert Love 2005-11-17 19:43:42 UTC
NM currently does not support WPA.  Support is in-the-works.
Comment 2 Christian Deckelmann 2005-11-26 19:38:50 UTC
Please have a look at feature ID 100140 when implementing Enterprise-WPA in NM.
IMHO NM should ask for some credentials (e.g. username and password) when a user tries to connect to an Enterpwise-WPA secured network.
Comment 3 Forgotten User ZhJd0F0L3x 2005-11-29 15:42:27 UTC
i have heard rumours that this won't make it into 10.1.
Without WPA-PSK and enterprise-WPA we cannot use any wireless at all here, and cannot test even the simplest functionality so this would probably a mega-blocker. Taking PM and responsible persons into cc:
Comment 4 Forgotten User ZhJd0F0L3x 2005-12-01 19:26:52 UTC
nothing changed with alpha3+
Comment 5 Robert Love 2006-01-03 20:17:12 UTC
*** Bug 141292 has been marked as a duplicate of this bug. ***
Comment 6 Robert Love 2006-01-12 17:56:01 UTC
Checked in 0.5.1cvs20060112, which adds both WPA-1 and WPA-2 (WPA Personal and WPA Enterprise).  Tested and works.

Closing bug as resolved.  If specific problems arise, please file new specific bugs.
Comment 7 Forgotten User ZhJd0F0L3x 2006-01-12 18:41:09 UTC
I think there is a slight misunderstanding of what "Enterprise WPA" is.

Enterprise-WPA is not WPA-PSK. A good introduction is available in
/usr/share/doc/packages/wpa_supplicant/README

Besides: i also could not get WPA-PSK to work, will attach the logfile.
Comment 8 Forgotten User ZhJd0F0L3x 2006-01-12 18:50:44 UTC
Created attachment 63175 [details]
/var/log/messages

This is the logfile from my WPA-PSK tests.
I tested it together with Christian and we tried all possible settings in nm-applet, including CCMP/TKIP variants and "WPA-2" but we could not get a connection to the wpa-psk enabled access point.
Comment 9 Forgotten User ZhJd0F0L3x 2006-01-12 18:51:38 UTC
the package i used was a mbuild of NetworkManager-0.5.1cvs20060112-1
Comment 10 Robert Love 2006-01-12 19:02:37 UTC
This is with an ipw2200?

You tried WPA-1 + TKIP and it did not work?  The log only shows CCMP (AES).
Comment 11 Robert Love 2006-01-12 19:13:33 UTC
seife: I just checked in an updated NM (not yet built) that might help you out.

Can you retest and let me know?  Let's just try WPA-1 + TKIP for now, to make things simple.
Comment 12 Forgotten User ZhJd0F0L3x 2006-01-12 20:21:28 UTC
i'll test tomorrow morning, deckel has enabled our access point for wpa-1/tkip a minute ago (was ccmp only before iiuc), but i have to catch my ride home now.
We did not see anything obviously wrong in the log (deckel is my WPA-god and he also did not spot anything obvious :-)
Comment 13 Forgotten User ZhJd0F0L3x 2006-01-12 20:26:54 UTC
I forgot: yes, this is ipw2200 and this machine can take ages to scan / associate, also with the old setup. Something i have to investigate separately.
Comment 14 Robert Love 2006-01-12 20:30:28 UTC
I have heard that ipw2200 takes a long time.  I bumped the timeout up to 90s (from only 10s!) in this newer version.  I think, looking at the log, it is just a timeout issue.  It should work.

Maybe we need to try even longer.  But WPA-1+TKIP should not take too long.  Let's see if 90s works.  It should!

Danke!
Comment 15 Robert Love 2006-01-12 23:27:22 UTC
Ack, wait!  I'll need to rebuild this tomorrow, the rebuild messed up and the timeout is still 10s.  I will update this once it is rebuilt.
Comment 16 Robert Love 2006-01-13 20:39:48 UTC
Alright, sorry about that!  ;-)

Submitted 0.5.1cvs20060113.  Check it out and let me know.
Comment 17 Christian Deckelmann 2006-01-16 18:31:34 UTC
We configured our wireless system for different ciphers:
TKIP only (for pairwise and group),
CCMP only (for pairwise and group) and
mixed TKIP/CCMP.

The first two worked when setting the coresponding ciphers in the NM applet.
The third one didn´t work because our WPA system didn´t accept CCMP as group cipher when TKIP is used for pairwise cipher.

I think wpa_supplicant will choose the right ciphers automatically.
It also selected WPA2 automatically when available.
So, what is the reason for forcing the wpa_supplicant to specific ciphers.
Proposal: Don´t specify the cipher types per default. Expert options can be provided but should not be necessary under normal circumstances.
Comment 18 Forgotten User ZhJd0F0L3x 2006-01-17 13:53:15 UTC
to elaborate more on this:
- i used the latest NM and tools:
  NetworkManager-0.5.1cvs20060116-2
  NetworkManager-kde-0.1-7
  NetworkManager-gnome-0.5.1cvs20060116-2
- it works fine with WPA1 and TKIP-only
- it works fine with WPA2 and CCMP-only
- it probably also works fine with WPA1 and CCMP-only

Caveats:
- i explicitly had to select "use WPA2" for the WPA2/CCMP-only case, otherwise
  it did not work (could still be a timeout problem with ipw2200, but i doubt
  it)

It does not work with "mixed" TKIP/CCMP setups.
Reason:
- NM always sets "group" and "pairwise" ciphers identically.
- In mixed setups, "group" has to be set to the lowest common denominator,
  which is TKIP => selecting "CCMP" cannot work in a mixed setup.

AFAIR i never configured anything like that for the old sysconfig method; this is one of my old configs (without the IPs and the empty variables):
BOOTPROTO='static'
STARTMODE='auto'
USERCONTROL='yes'
WIRELESS_AUTH_MODE='psk'
WIRELESS_BITRATE='auto'
WIRELESS_DEFAULT_KEY='0'
WIRELESS_ESSID='my-essid'
WIRELESS_KEY_LENGTH='128'
WIRELESS_MODE='Managed'
WIRELESS_POWER='yes'
WIRELESS_WPA_PSK='my-very-long-wpa-passphrase-that-is-very-secure'
PERSISTENT_NAME='air'
WIRELESS='yes'
which leads to the following config file:
seife@strolchi:/tmp> cat wpa_supplicant-air.conf 
ctrl_interface=/var/run/wpa_supplicant
network={
  scan_ssid=1
  ssid="my-essid"
  key_mgmt=WPA-PSK
  psk="my-very-long-wpa-passphrase-that-is-very-secure"
}

which seems to work reasonably well; wpa_supplicant figures out everything by himself.
Comment 19 Robert Love 2006-01-17 16:08:15 UTC
Submitted 0.5.1cvs20060117.
Comment 20 Forgotten User ZhJd0F0L3x 2006-01-21 19:08:08 UTC
latest build still does
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'INTERFACE_ADD air         wext    /var/run/wpa_supplicant '
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'AP_SCAN 2'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'ADD_NETWORK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was '0 '
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'SET_NETWORK 0 ssid "seifenschachtel"'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'SET_NETWORK 0 proto WPA'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'SET_NETWORK 0 psk FOOBAR
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'SET_NETWORK 0 pairwise TKIP'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'SET_NETWORK 0 group TKIP'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: sending command 'ENABLE_NETWORK 0'
Jan 20 23:51:58 strolchi NetworkManager: <information>  SUP: response was 'OK'
Jan 20 23:51:58 strolchi NetworkManager: <information>  Activation (air) Stage 2 (Device Configure) complete.

so it is not fixed...
Comment 21 Robert Love 2006-01-28 00:51:19 UTC
Seife, is the bug here that WPA-Enterprise is not implemented, or are you additionally reporting another problem?

If so, exactly what?  What driver?  Thanks.
Comment 22 Christian Deckelmann 2006-01-28 10:23:24 UTC
I guess the bug consists of two problems. 
The first is that WPA Enterprise is not implemented.

The second ist that NM doesn´t work with WPA Mixed Mode (pairwise:CCMP, group:TKIP) setups.
How about chaning NM to not specify the cipher types per default?
I guess this would work and make the user experience (no configuration needed)better.



Comment 23 Robert Love 2006-01-30 19:58:54 UTC
Alright.  I checked in support for automatic cipher calculation (select "Automatic" in the UI).  This will let pair/group mismatch networks work flawlessly.

I am changing the summary to note just the remaining WPA Enterprise issue.
Comment 24 Robert Love 2006-02-27 16:02:38 UTC
WPA Enterprise submitted to autobuild.  See package 0.5.1cvs20060227.
Comment 25 Robert Love 2006-02-28 15:36:38 UTC
Package is in beta 6.