Opened 8 years ago

Closed 3 years ago

#7660 closed bug (fixed)

Prop #8 WiFi (WPA,WPA2 encryption)

Reported by: scottmc Owned by: mmlr
Priority: normal Milestone: R1/beta1
Component: Network & Internet/Wireless Version: R1/Development
Keywords: Cc:
Blocked By: Blocking:
Has a Patch: no Platform: All

Description (last modified by pulkomandy)

Prop #8 WiFi (WPA,WPA2 encryption)

This was voted as a must-have for Haiku R1 and since a requirement for beta1 is to be feature complete, this is a beta1 blocker.

Developer results

  • must-have (nielx, pulkomandy, umccullough, czeidler, jprostko, siarzhuk, jonas.kirilla, scottmc, anevilyak, 3dEyes, stippi, axeld, leavengood, mmlr, yourpalal, mmadia, oruizdorantes, colin, zooey, ithamar, korli, laplace, tqh, phoudoin, bonefish, humdinger, Wim, sikosis, brecht)
  • only-if-ready none

General poll results

Change History (25)

comment:1 by mmadia, 8 years ago

Description: modified (diff)

comment:2 by scottmc, 8 years ago

Can we call this one complete yet?

in reply to:  2 ; comment:3 by mmlr, 8 years ago

Owner: changed from axeld to mmlr
Status: newin-progress

Replying to scottmc:

Can we call this one complete yet?

Technically yes, as the encryption and authentication is working with the wpa_supplicant in place. But really I'd see this one a bit broader, as in being usable conveniently in everyday scenarios. For this, storing the credentials and some form of sensible auto-connect still needs to be implemented. I'm taking ownership in any case.

in reply to:  3 ; comment:4 by scottmc, 7 years ago

Replying to mmlr:

Replying to scottmc:

Can we call this one complete yet?

Technically yes, as the encryption and authentication is working with the wpa_supplicant in place. But really I'd see this one a bit broader, as in being usable conveniently in everyday scenarios. For this, storing the credentials and some form of sensible auto-connect still needs to be implemented. I'm taking ownership in any case.

How much is left to do on this? Should we add #7663 as a blocker?

in reply to:  4 comment:5 by modeenf, 7 years ago

Replying to scottmc:

Replying to mmlr:

Replying to scottmc:

Can we call this one complete yet?

Technically yes, as the encryption and authentication is working with the wpa_supplicant in place. But really I'd see this one a bit broader, as in being usable conveniently in everyday scenarios. For this, storing the credentials and some form of sensible auto-connect still needs to be implemented. I'm taking ownership in any case.

How much is left to do on this? Should we add #7663 as a blocker?

I believe so..

comment:6 by scottmc, 6 years ago

Blocked By: 7663 added

comment:7 by umccullough, 6 years ago

I think we shouldn't hold this ticket up for #7663, it doesn't make sense.

Is there anything left to implement for WPA/WPA2 specifically?

comment:8 by pulkomandy, 6 years ago

Blocked By: 7663 removed

Yes, there are a few problems left:

  • Can't join network with special chars (space or so) in the SSID or key
  • Network connection is unreliable and will drop after some time, without any notice.
  • wpa_supplicant can be crashed easily, and isn't restarted
  • if you enter the wrong key and fail connecting to a network, you have to reboot and start over

comment:9 by pulkomandy, 5 years ago

Description: modified (diff)

in reply to:  8 comment:10 by taos, 4 years ago

Replying to pulkomandy:

Yes, there are a few problems left:

  • Can't join network with special chars (space or so) in the SSID or key

Which special characters still can't be used in the SSID? Since alpha 4 I've been able to connect to a SSID with 2 spaces (with a key containing special characters). In recent nightlies, such a key can also be stored with the keystore manager.

comment:11 by pulkomandy, 4 years ago

This may be ok now. I encoutered this issue back then with one of the wifi networks used at BeGeistert, and I can't test it easily here, lacking a secondary wifi AP on which I can test things. If someone has a test access point for this, it would be interesting to test:

  • spaces (but as mentionned this may work now)
  • special chars (quotes, *, etc)
  • unicode (SSID using cyrillic or CJK characters)

Both in the SSID and in the WPA key.

comment:12 by kallisti5, 4 years ago

#12279 -- Can't join network with special chars (space or so) in the SSID or key

comment:13 by kallisti5, 4 years ago

Blocked By: 12280 added

comment:14 by kallisti5, 4 years ago

#12280 -- Failing to connect to a wifi ap results in the need for a reboot.

comment:15 by kallisti5, 4 years ago

Blocked By: 12279 added

comment:16 by kallisti5, 4 years ago

Blocked By: 12281 added

comment:17 by kallisti5, 4 years ago

#12281 -- wpa_supplicant can be crashed easily, and isn't restarted

comment:18 by kallisti5, 4 years ago

As for "Network connection is unreliable and will drop after some time, without any notice.", is this still an issue? Maybe we just need a simple notification of wifi network connectivity loss?

in reply to:  18 comment:19 by mmlr, 4 years ago

Replying to kallisti5:

As for "Network connection is unreliable and will drop after some time, without any notice.", is this still an issue? Maybe we just need a simple notification of wifi network connectivity loss?

This is generally something the wpa_supplicant is supposed to handle internally. It monitors the network interface and should react to the disassociation event. As long as the configuration isn't changed by attempting to connect to a different network, the settings and credentials the wpa_supplicant uses stay the same. It should therefore attempt to reassociate with the previous access point. I am somewhat certain that I have observed this on my network and that it worked as intended (but it's been quite a while since I actively looked so my memory might play tricks). A reproducible test case would be helpful to confirm/refute this would helpful.

An issue on the lower layers, i.e. FreeBSD compatibility and drivers, could also be at play here. A corresponding log should be gathered by running the wpa_supplicant from the terminal before attempting to connect and then connecting as usual (which should then use the already running wpa_supplicant).

comment:20 by axeld, 4 years ago

Priority: blockernormal

No reason to make this blocking a release anymore.

comment:21 by pulkomandy, 3 years ago

I think jua's change to allow disabling wifi N support fixed most of the problems on my machines. Things can still be improved but I think we could consider this ticket fixed and open more specific ones for remaining problems now?

comment:22 by axeld, 3 years ago

Blocked By: 12281 removed

comment:23 by axeld, 3 years ago

Blocked By: 12280 removed

comment:24 by axeld, 3 years ago

Blocked By: 12279 removed

comment:25 by axeld, 3 years ago

Resolution: fixed
Status: in-progressclosed

Sure, actually already before that; the feature has been implemented. Eventual bugs should be handled in their own tickets.

Note: See TracTickets for help on using tickets.