Open farfade opened 3 years ago
what does your uci for the wifi-iface look like ? EAP is driver agnostic and handled solely by hostapd.
Thank you @blogic for you interest.
Here is my uci
config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option auth_secret '--'
option auth_server '192.168.2.4'
option ieee80211w '1'
option ssid 'RM-5G'
option encryption 'wpa2+ccmp'
option wpa_disable_eapol_key_retries '1'
config wifi-iface 'wifinet2'
option network 'lan'
option ssid 'infra5G-2'
option encryption 'psk2+ccmp'
option device 'radio1'
option mode 'ap'
option key '--'
option wpa_disable_eapol_key_retries '1'
config wifi-iface 'wifinet3'
option network 'GUEST'
option encryption 'psk2+ccmp'
option device 'radio1'
option mode 'ap'
option isolate '1'
option key '--'
option ssid 'Nous-5G'`
Hello,
Using 19.07.7 on a router newifi3 (newifi D2 - mt76 wifi driver), and EAP-TTLS, I'm facing the following with Windows clients (intel wifi chip with latest intel driver from january 2021)
The windows 10 client speaks about a failure in dynamic key exchanges The radius servers correctly sends an Accept:Accept message and MPPE Keys.
Whereas
Isn't there a bug in the driver when sending the dynamic keys to the client, after having received it from the radius server ?
Thank you for reading !
Cheers