I use the following method to bypass this bugļ¼Œ
1. create openssl.cnf for wpa_supplicant
- sudo cp /etc/ssl/openssl.cnf /etc/wpa_supplicant/
- motify /etc/wpa_supplicant/openssl.cnf
*** /etc/ssl/openssl.cnf        Fri Apr 22 14:54:42 2022
--- /etc/wpa_supplicant/openssl.cnf     Fri Apr 22 14:55:22 2022
***************
*** 52,57 ****
--- 52,64 ----
   
  [openssl_init]
  providers = provider_sect
+ ssl_conf = ssl_sect
+   
+ [ssl_sect]
+ system_default = system_default_sect
+   
+ [system_default_sect]
+ Options = UnsafeLegacyRenegotiation

  # List of providers to load
2. modify /usr/lib/systemd/system/wpa_supplicant.service
***************
*** 8,13 ****
--- 8,14 ----
  [Service]
  Type=dbus
  BusName=fi.w1.wpa_supplicant1
+ Environment="OPENSSL_CONF=/etc/wpa_supplicant/openssl.cnf"
  ExecStart=/sbin/wpa_supplicant -u -s -O /run/wpa_supplicant
  ExecReload=/bin/kill -HUP $MAINPID
3. restart wpa_supplicant
sudo systemctl daemon-reload
sudo systemctl restart wpa_supplicant.service

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958267

Title:
  "Connection failed" for WPA Enterprise network eduroam

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1958267/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to