As discovered by @jubeormk1 in his extensive testing from #79 (review),
// Option 1: Add explicit channel
AccessPointConfig::default()
.with_ssid(...)
.with_auth_method(Wpa2Wpa3Personal)
.with_password(...)
.with_channel(esp_radio::wifi::Channel::C1) // Explicit channel
// Option 2: Add PMF configuration (if available)
// WPA2/WPA3 transition mode may help
Workarounds for users:
- On the client side: nmcli connection delete ssh-stamp then reconnect
- Or "Forget network" in WiFi settings before retrying
Hardware debugging needed:
- Enable esp-radio=debug logging to see if auth failure events are emitted
- Check if WifiEvent::ApStaDisconnected exists and should be handled
The (unnecessary for our application?) randomised mac could also explain the problem? Maybe the client attempts to protect the user from evil twins attacks?
As discovered by @jubeormk1 in his extensive testing from #79 (review),
The (unnecessary for our application?) randomised mac could also explain the problem? Maybe the client attempts to protect the user from evil twins attacks?