I'm not quite sure about the attempts written in the description of the bug, as they do not look like correct instructions to downgrade openssl to Seclevel 0.
If you are looking for instuctions on how to make your systems insecure and allow using weak keys, broken certificates and obsolete protocol versions you can use these instructions for OpenSSL and GnuTLS on per- app or system-wide basis https://discourse.ubuntu.com/t/default-to- tls-v1-2-in-all-tls-libraries-in-20-04-lts/12464/8?u=xnox However, I advise you to rotate / upgrade your certificates to use widely available and accepted hash-algos, key sizes, protocol versions indead. I will close this bug as invalid. ** Changed in: openssl (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1866611 Title: OpenVPN w. SHA1 signed CA broken after upgrade to 1.1.1d-2ubuntu6 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1866611/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
