Bug 1993379

Summary: [RFE] support wifi Enhanced Open (OWE)
Product: Red Hat Enterprise Linux 8 Reporter: Rich Megginson <rmeggins>
Component: rhel-system-rolesAssignee: Rich Megginson <rmeggins>
Status: CLOSED ERRATA QA Contact: Zhiqian Guan <zhguan>
Severity: unspecified Docs Contact: Marc Muehlfeld <mmuehlfe>
Priority: unspecified    
Version: 8.5CC: djez, elpereir, fge, gfialova, jharuda, nhosoi, qe-baseos-apps, spetrosi, zhguan
Target Milestone: betaKeywords: FutureFeature, Triaged
Target Release: 8.6   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: role:network
Fixed In Version: rhel-system-roles-1.11.0-1.el8 Doc Type: Enhancement
Doc Text:
.The `network` System Role now supports OWE Opportunistic Wireless Encryption (OWE) is a mode of opportunistic security for Wi-Fi networks that provides encryption of the wireless medium but no authentication, such as public hot spots. OWE uses encryption between Wi-Fi clients and access points, protecting them from sniffing attacks. With this enhancement, the `network` RHEL System role supports OWE. As a result, administrators can now use the `network` System Role to configure connections to Wi-Fi networks which use OWE.
Story Points: ---
Clone Of: 1993377 Environment:
Last Closed: 2022-05-10 14:12:08 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1993377    
Bug Blocks:    

Comment 1 Rich Megginson 2021-08-12 21:54:10 UTC
leaving this as POST - the change is already in the code, but can't be properly tested/supported until 8.6

Comment 3 Zhiqian Guan 2021-11-16 05:30:21 UTC
:: [ 00:15:57 ] :: [   PASS   ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_6_10_GA (Expected 0, got 0)
:: [ 00:17:59 ] :: [   PASS   ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_7_9_GA (Expected 0, got 0)
:: [ 00:20:43 ] :: [   PASS   ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_8_4_0_GA (Expected 0, got 0)
:: [ 00:23:58 ] :: [   PASS   ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_8_5_0_TESTING (Expected 0, got 0)
:: [ 00:27:35 ] :: [   PASS   ] :: Test network/tests_wireless_wpa3_owe_nm.yml (roles/rhel-system-roles.network/tests/tests_wireless_wpa3_owe_nm.yml) with ANSIBLE-2.9 against RHEL_9_TESTING (Expected 0, got 0)

[root@netqe1 Upstream-testsuite]# rpm -q rhel-system-roles
rhel-system-roles-1.10.0-0.1.el8.noarch
[root@netqe1 Upstream-testsuite

results look good, set this to verified: tested

Comment 7 Zhiqian Guan 2021-12-09 06:57:38 UTC
postpone to ITM16 as this still in POST

Comment 13 errata-xmlrpc 2022-05-10 14:12:08 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (rhel-system-roles bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:1896