Bug#667706: [pkg-wpa-devel] Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2014-05-23 Thread Pablo Mazzini

Hi,

I have tried using the wpa_supplicant 2.1 release and I can no longer 
reproduce this bug.


I think it was fixed in the 2.0 one, this is a meaningful extract from 
the 2.0 changelog:


* added mechanism to disable TLS Session Ticket extension
  - a workaround for servers that do not support TLS extensions that
was enabled by default in recent OpenSSL versions
  - tls_disable_session_ticket=1
  - automatically disable TLS Session Ticket extension by default when
using EAP-TLS/PEAP/TTLS (i.e., only use it with EAP-FAST)

Regards,
Pablo Mazzini


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#667706: [pkg-wpa-devel] Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-08-13 Thread Stefan Lippers-Hollmann
Control: forcemerge 561081 -1

Hi

On Monday 13 August 2012, Raghav Krishnapriyan wrote:
 Applying the upstream patch Ben Kay refers to above fixes the problem for me.

That is not an upstream patch (as in, it's neither appled upstream 
nor condoned to be used on production systems), but merely a debugging 
patch, to find out where the remote RADIUS implementation fails. As far
as I understand the buglog so far, and I have no access to those 
failing networks, neither wpa_supplicant nor openssl are actually 
misbehaving. Rather than a bug in Debian, it appears that this 
particular commercial (apparently from Aruba) is behaving in a weird
way that breaks interoperability.

At this moment it is not clear if wpasupplicant/ openssl or the remote 
RADIUS implementation is at fault. Given that none of the Debian 
wpasupplicant maintainers have access to affected networks, the best 
curse of action is to work with upstream to debug this further. Maybe
there is a safe way to work around this quirky RADIUS implementation,
maybe there is an actual problem that needs to be fixed in that RADIUS
implementation. However just blindly disabling those checks might 
create more problems than it does solve.

Regards
Stefan Lippers-Hollmann


signature.asc
Description: This is a digitally signed message part.