I use the following method to bypass this bugļ¼ 1. create openssl.cnf for wpa_supplicant - sudo cp /etc/ssl/openssl.cnf /etc/wpa_supplicant/ - motify /etc/wpa_supplicant/openssl.cnf *** /etc/ssl/openssl.cnf Fri Apr 22 14:54:42 2022 --- /etc/wpa_supplicant/openssl.cnf Fri Apr 22 14:55:22 2022 *************** *** 52,57 **** --- 52,64 ---- [openssl_init] providers = provider_sect + ssl_conf = ssl_sect + + [ssl_sect] + system_default = system_default_sect + + [system_default_sect] + Options = UnsafeLegacyRenegotiation
# List of providers to load 2. modify /usr/lib/systemd/system/wpa_supplicant.service *************** *** 8,13 **** --- 8,14 ---- [Service] Type=dbus BusName=fi.w1.wpa_supplicant1 + Environment="OPENSSL_CONF=/etc/wpa_supplicant/openssl.cnf" ExecStart=/sbin/wpa_supplicant -u -s -O /run/wpa_supplicant ExecReload=/bin/kill -HUP $MAINPID 3. restart wpa_supplicant sudo systemctl daemon-reload sudo systemctl restart wpa_supplicant.service -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958267 Title: "Connection failed" for WPA Enterprise network eduroam To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1958267/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs