Package: wpasupplicant
Version: 2:2.7~git20181004+1dd66fc-1
Followup-For: Bug #907518
wpasupplicant should accept a tls MinVersion parameter to be specified
per-network. Nobody wants to adjust the global setting just to connect
to an outdated system.
As pointed out, I also spotted this while
Similar story here. The update broke eduroam networks for me, but
downgrading to the testing package makes the issue disappear.
---
wpa_supplicant[11832]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
wpa_supplicant[11832]: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0
method 21 (TTLS)
Same for me,
Doesn't work with any of the EAP methods I've tried with WPA
Enterprise.
wpa_supplicant[702]: wlp1s0: CTRL-EVENT-EAP-STARTED EAP authentication
started
wpa_supplicant[702]: wlp1s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0
method=4 -> NAK
wpa_supplicant[702]: wlp1s0:
Package: wpasupplicant
Version: 2:2.6-18
Severity: important
With libssl1.1 1.1.1~~pre9-1, which more aggressively deprecates smaller
key sizes by default, I can no longer connect to my office wifi network:
wpa_supplicant[523]: OpenSSL: pending error: error:0D07803A:asn1 encoding
4 matches
Mail list logo