-
Notifications
You must be signed in to change notification settings - Fork 7.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AES encryption support for softAP mode in ESP32 (IDFGH-4092) #5963
Comments
Thanks for raising this feature request. |
@coolesthead The softAP already supports AES. By default, it uses mixed mode (CCMP+TKIP) when security is used. iOS13 maybe cribbing because of the mixed mode. We will add additional parameter in the config to choose the cipher-suite which is currently missing. WPA3 development for SoftAP is in progress. |
Thanks @sagb2015 this helps. |
Hi @sagb2015 |
Interested in this as well. Mainly to get rid of the >= iOS13 warnings. |
+1 Our business is also interested in this feature. |
WPA3 for softap is a feature request. |
@AxelLin Please note mixed mode in WPA2 is a valid scenario and not a bug. We will provide a new option to set pairwise cipher in softAP configuration so that users can select TKIP/CCMP/TKIP+CCMP as they require(with the default option as TKIP+CCMP). |
This is not what I complaint.
This is indeed what I complaint and I think it is a bug. (AFAIK, non-esp32 sdks can allow user to set this setting). |
Is your feature request related to a problem? Please describe.
I've updated my phone to iOS14 and I tried connecting to the soft AP of ESP32. I had chosen WPA2_PSK as AUTH mode. When I connect my phone, iOS is giving the warning that, WiFi is using WPA2(TKIP) as encryption and suggesting to use WPA2(AES)/WPA3. Since WPA3 is not available for softAP, I'm requesting to support WPA2(AES) for softAP mode.
Describe the solution you'd like
Adding support for AES for WPA2_PSK or adding WPA3 as auth mode for softAP
Describe alternatives you've considered
I don't think any alternatives available as far this is concerned.
Additional context
iOS13 didn't show warning if we use WPA2(TKIP). Only after the iOS14 update, they marked WPA2(TKIP) as unsafe. Only WPA2(AES) or WPA3 are considered as safe.
The text was updated successfully, but these errors were encountered: