I just confirmed that this is a regression is caused by the final
deprecation of dbus-glib in NM 1.2x, and it's replacement by gdbus.  As
part of this work, the code which requests secrets from a secret-agent,
now uses code generated from the introspection XML to make the actual
DBus method call.  As this generated function doesn't have a parameter
to allow the client to specify a timeout, the default ( ~25s ) gets
used.  This contrasts to the old code which explicitly specified a 120s
timeout as a parameter to dbus_g_proxy_begin_call_with_timeout().

So, if the user types the passphrase ( or 64-char hex key ) in < ~25s,
the connection should work.  The maximum length passphrase ( repeating
blocks of '1234567890' ) is ~40 characters before the timeout makes it
impossible to type anything longer.

An upstream bug had been reported and is currently in-progress:

https://bugzilla.gnome.org/show_bug.cgi?id=767321

Currently the only workaround for this is to manually update the system
connection file for the AP with the psk and restart the device.  It then
should be possible to tap the access point in the WiFi list, and as long
as the passphrase is correct in the connection file, NM should reconnect
to the network automatically when available.  You can accomplish this by
stopping NM on the device and editing the connection file directly, or
copying the connection file from the device, editing, and pushing it
back ( via adb ).  System connection files are found in the directory
/etc/NetworkManager/system-connections.

I've verified with a krillin running OTA11 that passphrases up to 63
characters work correctly once they've been pre-populated in a
connection file.  I haven't yet verified a 64-character hex key, but
will make sure this is tested as well before we release the final fix.




** Bug watch added: GNOME Bug Tracker #767321
   https://bugzilla.gnome.org/show_bug.cgi?id=767321

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1593686

Title:
  Wi-Fi passphrase limit introduced in OTA-11

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1593686/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to