@Remy, I update the test plan section. > Install (Jammy, noble, Oracular) image on machine, and install the specific netplan version <need link here>
Need you provide the link or others here. ** Description changed: Stable Release Update for WPA2-PSK-SHA256 support in netplan.io to Jammy. Another SRU, for Jammy, was prepared in a separate LP bug and is blocking this one: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988018. [ Impact ] This release fixes a bug with wifi feature. It adds support for WPA2-PSK-SHA256: https://github.com/canonical/netplan/pull/531 [ Test Plan ] + Test the WPA-PSK-SHA256 support WPA and WPA2. + + Test the yaml key-management is set to psk-sha256 can support WPA2 only. + HW Setup: + set up an AP security protocol set to **WPA2 only**. + + Install (Jammy, noble, Oracular) image on machine, and install the specific netplan version <need link here> + + Test on renderer is NetworkManager: + 1. Make sure the machine NetworkManager service is activated and the systemd-networkd is not working. + ``` + $ systemctl status NetworkManager + <...skip...> + Active: active + <...skip...> + + $ systemctl status systemd-networkd + <...skip...> + Active: inactive (dead) + <...skip...> + ``` + + 2. Create a testing yaml (ie. `testing_nm_psk256.yaml`) file under `/etc/netplan/` (Please make sure there is no other yaml file which will handle the wifi interface. Or you can just backup those original file to another place) + ``` + network: + version: 2 + renderer: NetworkManager + wifis: + <wifi interface>: + access-points: + <WPA2 only SSID>: + auth: + key-management: psk-sha256 + password: insecure + dhcp4: true + nameservers: {} + + ``` + + 3. Run `sudo netplan apply`, and make sure it will not complain with any error. + + 4. Run `nmcli device show <wifi interface>` to check if the connect is routable; Run `sudo wpa_cli status` to check the `key_mgmt=WPA2-PSK` + + + Test on renderer is systemd-networkd: + 1. Make sure the machine service is systemd-networkd and the NetworkManager is not working (or not exist). + ``` + $ systemctl status NetworkManager + <...skip...> + Active: inactive (dead) + <...skip...> + + $ systemctl status systemd-networkd + <...skip...> + Active: active (running) + <...skip...> + ``` + + 2. Create a testing yaml (ie. `testing_nm_psk256.yaml`) file under `/etc/netplan/`. (Please make sure there is no other yaml file which will handle the wifi interface. Or you can just backup those original file to another place) + ``` + network: + version: 2 + wifis: + <wifi interface>: + access-points: + <WPA2 only SSID>: + auth: + key-management: psk-sha256 + password: insecure + dhcp4: true + nameservers: {} + + ``` + + 3. Run `sudo netplan apply`, and make sure it will not complain with any error. + + 4. Run `networkctl status <wifi interface>` to check if the connect is routable; Run `sudo wpa_cli status` to check the `key_mgmt=WPA2-PSK` + + + + Test the yaml key-management is set to psk-sha256 can support WPA only. + HW Setup: + set up an AP security protocol set to **WPA only**. (For now, it's hard to find the AP only support WPA only. We could skip this, is we can't find this AP.) + + The following step is same as the the above. + The one difference thing is checking the `key_mgmt=WPA-PSK` in `sudo wpa_cli status` + + + Test the yaml key-management is set to psk-sha256 can support WPA/WPA2 combinateion. + HW Setup: + set up an AP security protocol set to **WPA+WPA2** (For now, most APs are support this.) + + + The following step is same as the above. + Only need to seperate testing the `key-management: psk-sha256` and `key-management: psk` in testing yaml. And check we can correctly connect with the AP. (Checking the key_mgmt in `sudo wpa_cli status` is not necessary in here) + + [ Where problems could occur ] [ Other Info ] ** Description changed: Stable Release Update for WPA2-PSK-SHA256 support in netplan.io to Jammy. Another SRU, for Jammy, was prepared in a separate LP bug and is blocking this one: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988018. [ Impact ] This release fixes a bug with wifi feature. It adds support for WPA2-PSK-SHA256: https://github.com/canonical/netplan/pull/531 [ Test Plan ] - Test the WPA-PSK-SHA256 support WPA and WPA2. + Test purpose: + Test the WPA-PSK-SHA256 support WPA and WPA2 and the original WPA-PSK still can connect the AP with WPA security protocal. - Test the yaml key-management is set to psk-sha256 can support WPA2 only. - HW Setup: - set up an AP security protocol set to **WPA2 only**. - - Install (Jammy, noble, Oracular) image on machine, and install the specific netplan version <need link here> - - Test on renderer is NetworkManager: - 1. Make sure the machine NetworkManager service is activated and the systemd-networkd is not working. - ``` - $ systemctl status NetworkManager - <...skip...> - Active: active - <...skip...> - - $ systemctl status systemd-networkd - <...skip...> - Active: inactive (dead) - <...skip...> - ``` - - 2. Create a testing yaml (ie. `testing_nm_psk256.yaml`) file under `/etc/netplan/` (Please make sure there is no other yaml file which will handle the wifi interface. Or you can just backup those original file to another place) - ``` - network: - version: 2 - renderer: NetworkManager - wifis: - <wifi interface>: - access-points: - <WPA2 only SSID>: - auth: - key-management: psk-sha256 - password: insecure - dhcp4: true - nameservers: {} + Scenario 1: + Test the yaml key-management is set to psk-sha256 can support **WPA2 only**. + HW Setup: + set up an AP security protocol set to **WPA2 only**. - ``` - - 3. Run `sudo netplan apply`, and make sure it will not complain with any error. - - 4. Run `nmcli device show <wifi interface>` to check if the connect is routable; Run `sudo wpa_cli status` to check the `key_mgmt=WPA2-PSK` + Install (Jammy, noble, Oracular) image on machine, and install the + specific netplan version <need link here> + Test on renderer is NetworkManager: + 1. Make sure the machine NetworkManager service is activated and the systemd-networkd is not working. + ``` + $ systemctl status NetworkManager + <...skip...> + Active: active + <...skip...> - Test on renderer is systemd-networkd: - 1. Make sure the machine service is systemd-networkd and the NetworkManager is not working (or not exist). - ``` - $ systemctl status NetworkManager - <...skip...> - Active: inactive (dead) - <...skip...> - - $ systemctl status systemd-networkd - <...skip...> - Active: active (running) - <...skip...> - ``` - - 2. Create a testing yaml (ie. `testing_nm_psk256.yaml`) file under `/etc/netplan/`. (Please make sure there is no other yaml file which will handle the wifi interface. Or you can just backup those original file to another place) - ``` - network: - version: 2 - wifis: - <wifi interface>: - access-points: - <WPA2 only SSID>: - auth: - key-management: psk-sha256 - password: insecure - dhcp4: true - nameservers: {} + $ systemctl status systemd-networkd + <...skip...> + Active: inactive (dead) + <...skip...> + ``` - ``` - - 3. Run `sudo netplan apply`, and make sure it will not complain with any error. - - 4. Run `networkctl status <wifi interface>` to check if the connect is routable; Run `sudo wpa_cli status` to check the `key_mgmt=WPA2-PSK` - + 2. Create a testing yaml (ie. `testing_nm_psk256.yaml`) file under `/etc/netplan/` (Please make sure there is no other yaml file which will handle the wifi interface. Or you can just backup those original file to another place) + ``` + network: + version: 2 + renderer: NetworkManager + wifis: + <wifi interface>: + access-points: + <WPA2 only SSID>: + auth: + key-management: psk-sha256 + password: insecure + dhcp4: true + nameservers: {} + ``` - Test the yaml key-management is set to psk-sha256 can support WPA only. - HW Setup: - set up an AP security protocol set to **WPA only**. (For now, it's hard to find the AP only support WPA only. We could skip this, is we can't find this AP.) - - The following step is same as the the above. - The one difference thing is checking the `key_mgmt=WPA-PSK` in `sudo wpa_cli status` + 3. Run `sudo netplan apply`, and make sure it will not complain + with any error. + 4. Run `nmcli device show <wifi interface>` to check if the connect + is routable; Run `sudo wpa_cli status` to check the `key_mgmt=WPA2-PSK` - Test the yaml key-management is set to psk-sha256 can support WPA/WPA2 combinateion. - HW Setup: - set up an AP security protocol set to **WPA+WPA2** (For now, most APs are support this.) - + Test on renderer is systemd-networkd: + 1. Make sure the machine service is systemd-networkd and the NetworkManager is not working (or not exist). + ``` + $ systemctl status NetworkManager + <...skip...> + Active: inactive (dead) + <...skip...> - The following step is same as the above. - Only need to seperate testing the `key-management: psk-sha256` and `key-management: psk` in testing yaml. And check we can correctly connect with the AP. (Checking the key_mgmt in `sudo wpa_cli status` is not necessary in here) + $ systemctl status systemd-networkd + <...skip...> + Active: active (running) + <...skip...> + ``` + 2. Create a testing yaml (ie. `testing_nm_psk256.yaml`) file under `/etc/netplan/`. (Please make sure there is no other yaml file which will handle the wifi interface. Or you can just backup those original file to another place) + ``` + network: + version: 2 + wifis: + <wifi interface>: + access-points: + <WPA2 only SSID>: + auth: + key-management: psk-sha256 + password: insecure + dhcp4: true + nameservers: {} + + ``` + + 3. Run `sudo netplan apply`, and make sure it will not complain + with any error. + + 4. Run `networkctl status <wifi interface>` to check if the connect + is routable; Run `sudo wpa_cli status` to check the `key_mgmt=WPA2-PSK` + + Scenario 2: + Test the yaml key-management is set to psk-sha256 can support **WPA only**. + HW Setup: + set up an AP security protocol set to **WPA only**. (For now, it's hard to find the AP only support WPA only. We could skip this, is we can't find this AP.) + + The following step is same as the the above. + The one difference thing is checking the `key_mgmt=WPA-PSK` in `sudo wpa_cli status` + + Scenario 3: + Test the yaml key-management is set to psk-sha256 can support **WPA+WPA2**. + HW Setup: + set up an AP security protocol set to **WPA+WPA2** (For now, most APs are support this.) + + The following step is same as the above. + Only need to seperate testing the `key-management: psk-sha256` and `key-management: psk` in testing yaml. And check we can correctly connect with the AP. (Checking the key_mgmt in `sudo wpa_cli status` is not necessary in here) [ Where problems could occur ] [ Other Info ] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2102097 Title: [SRU] Backport WPA2-PSK-SHA256 support to Ubuntu 22.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/2102097/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs