Bug 1993379
Summary: | [RFE] support wifi Enhanced Open (OWE) | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Rich Megginson <rmeggins> |
Component: | rhel-system-roles | Assignee: | Rich Megginson <rmeggins> |
Status: | CLOSED ERRATA | QA Contact: | Zhiqian Guan <zhguan> |
Severity: | unspecified | Docs Contact: | Marc Muehlfeld <mmuehlfe> |
Priority: | unspecified | ||
Version: | 8.5 | CC: | djez, elpereir, fge, gfialova, jharuda, nhosoi, qe-baseos-apps, spetrosi, zhguan |
Target Milestone: | beta | Keywords: | FutureFeature, Triaged |
Target Release: | 8.6 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | role:network | ||
Fixed In Version: | rhel-system-roles-1.11.0-1.el8 | Doc Type: | Enhancement |
Doc Text: |
.The `network` System Role now supports OWE
Opportunistic Wireless Encryption (OWE) is a mode of opportunistic security for Wi-Fi networks that provides encryption of the wireless medium but no authentication, such as public hot spots. OWE uses encryption between Wi-Fi clients and access points, protecting them from sniffing attacks. With this enhancement, the `network` RHEL System role supports OWE. As a result, administrators can now use the `network` System Role to configure connections to Wi-Fi networks which use OWE.
|
Story Points: | --- |
Clone Of: | 1993377 | Environment: | |
Last Closed: | 2022-05-10 14:12:08 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1993377 | ||
Bug Blocks: |
Comment 1
Rich Megginson
2021-08-12 21:54:10 UTC
:: [ 00:15:57 ] :: [ PASS ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_6_10_GA (Expected 0, got 0) :: [ 00:17:59 ] :: [ PASS ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_7_9_GA (Expected 0, got 0) :: [ 00:20:43 ] :: [ PASS ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_8_4_0_GA (Expected 0, got 0) :: [ 00:23:58 ] :: [ PASS ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_8_5_0_TESTING (Expected 0, got 0) :: [ 00:27:35 ] :: [ PASS ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_9_TESTING (Expected 0, got 0) [root@netqe1 Upstream-testsuite]# rpm -q rhel-system-roles rhel-system-roles-1.10.0-0.1.el8.noarch [root@netqe1 Upstream-testsuite results look good, set this to verified: tested postpone to ITM16 as this still in POST Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (rhel-system-roles bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:1896 |