You are not logged in.

#1 2022-11-05 21:34:39

coddiw0mple
Member
From: Mumbai, India
Registered: 2021-03-13
Posts: 10

[SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

After a recent update to the 6.0 kernel with openssl 3, I can no longer connect to WPA2 Enterprise networks.

These are my logs. I am sure this seems to be an issue with openssl but I am not sure if I should try a downgrade or just remap the libssl.so symlink from libssl.so.3 to the original libssl.so.1.1 (which might be stupid of me, I am not sure how to do this so here I am)


Nov 06 02:55:08 council wpa_supplicant[562]: wlp0s20f3: Associated with 44:31:92:a6:ce:00
Nov 06 02:55:08 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
Nov 06 02:55:08 council NetworkManager[534]: <info>  [1667683508.0944] device (wlp0s20f3): supplicant interface state: associating -> associated
Nov 06 02:55:08 council NetworkManager[534]: <info>  [1667683508.0944] device (p2p-dev-wlp0s20f3): supplicant management interface state: associating -> associated
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-STARTED EAP authentication started
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=varuna.amritanet.edu' hash=31e3abeb76e2e9d75308b9bd2da85ed63373a1abd265b17132ca3b6ef>
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:varuna.amritanet.edu
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=varuna.amritanet.edu' hash=31e3abeb76e2e9d75308b9bd2da85ed63373a1abd265b17132ca3b6ef>
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:varuna.amritanet.edu
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=varuna.amritanet.edu' hash=31e3abeb76e2e9d75308b9bd2da85ed63373a1abd265b17132ca3b6ef>
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:varuna.amritanet.edu
Nov 06 02:55:09 council wpa_supplicant[562]: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:internal error
Nov 06 02:55:09 council wpa_supplicant[562]: OpenSSL: openssl_handshake - SSL_connect error:0A0C0103:SSL routines::internal error
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-EAP-FAILURE EAP authentication failed
Nov 06 02:55:09 council kernel: wlp0s20f3: deauthenticated from 44:31:92:a6:ce:00 (Reason: 1=UNSPECIFIED)
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-DISCONNECTED bssid=44:31:92:a6:ce:00 reason=1
Nov 06 02:55:09 council wpa_supplicant[562]: wlp0s20f3: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Amrita" auth_failures=2 duration=31 reason=AUTH_FAILED
Nov 06 02:55:09 council wpa_supplicant[562]: BSSID 44:31:92:a6:ce:00 ignore list count incremented to 3, ignoring for 60 seconds
Nov 06 02:55:09 council NetworkManager[534]: <info>  [1667683509.5485] device (wlp0s20f3): supplicant interface state: associated -> disconnected
Nov 06 02:55:09 council NetworkManager[534]: <info>  [1667683509.5487] device (p2p-dev-wlp0s20f3): supplicant management interface state: associated -> disconnected
Nov 06 02:55:09 council NetworkManager[534]: <info>  [1667683509.6484] device (wlp0s20f3): supplicant interface state: disconnected -> scanning
Nov 06 02:55:09 council NetworkManager[534]: <info>  [1667683509.6485] device (p2p-dev-wlp0s20f3): supplicant management interface state: disconnected -> scanning
Nov 06 02:55:18 council NetworkManager[534]: <warn>  [1667683518.0082] device (wlp0s20f3): Activation: (wifi) association took too long
Nov 06 02:55:18 council NetworkManager[534]: <info>  [1667683518.0082] device (wlp0s20f3): state change: config -> need-auth (reason 'none', sys-iface-state: 'managed')
Nov 06 02:55:18 council NetworkManager[534]: <warn>  [1667683518.0093] device (wlp0s20f3): Activation: (wifi) asking for new secrets

Last edited by coddiw0mple (2022-11-06 15:25:51)


u/YodaTheSexyCummunist

Offline

#2 2022-11-05 21:44:18

loqs
Member
Registered: 2014-03-06
Posts: 17,363

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

Have you looked at https://bugs.launchpad.net/ubuntu/+sour … ug/1958267 particularly comments #22 and #36?

Offline

#3 2022-11-05 22:08:50

coddiw0mple
Member
From: Mumbai, India
Registered: 2021-03-13
Posts: 10

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

loqs wrote:

Have you looked at https://bugs.launchpad.net/ubuntu/+sour … ug/1958267 particularly comments #22 and #36?

I tried the steps, but to no avail. WPA2 works normally. WPA2 Enterprise does not

The logs still say it's some sort of 'internal error' of openssl.

If this helps: I also went through my share of the libcrypto.so errors that recently hit the forums

Last edited by coddiw0mple (2022-11-05 22:09:09)


u/YodaTheSexyCummunist

Offline

#4 2022-11-05 22:33:33

loqs
Member
Registered: 2014-03-06
Posts: 17,363

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

Try rebuilding wpa_supplicant with https://src.fedoraproject.org/rpms/wpa_ … tion.patch applied i.e make the following changes to the PKGBUILD:

diff --git a/trunk/PKGBUILD b/trunk/PKGBUILD
index 0c097c0..0a1b3d5 100644
--- a/trunk/PKGBUILD
+++ b/trunk/PKGBUILD
@@ -20,6 +20,7 @@ source=(
   wpa_supplicant_service_ignore-on-isolate.patch  # More unit improvements from Ubuntu
   wpa_supplicant_config
   add_extra-ies_only_if_allowed_by_driver.patch
+  https://src.fedoraproject.org/rpms/wpa_supplicant/raw/rawhide/f/wpa_supplicant-allow-legacy-renegotiation.patch
 )
 validpgpkeys=('EC4AA0A991A5F2464582D52D2B6EF432EFC895FA') # Jouni Malinen
 sha256sums=('20df7ae5154b3830355f8ab4269123a87affdea59fe74fe9292a91d0d7e17b2f'
@@ -28,7 +29,8 @@ sha256sums=('20df7ae5154b3830355f8ab4269123a87affdea59fe74fe9292a91d0d7e17b2f'
             '60f6a1cf2e124813dfce1da78ee1818e2ff5236aafa4113c7ae3b3f2a0b84006'
             'd42bdbf3d4980b9f0a819612df0c39843c7e96c8afcb103aa656c824f93790b0'
             '89dc439b958574e9231c58bea6c83faec469909c9f84476bfc83fa35b3e97bd1'
-            'aaedf87f1530d4e6cb00bf7981d1f868409ed892cc41b83c5613019e7b51f380')
+            'aaedf87f1530d4e6cb00bf7981d1f868409ed892cc41b83c5613019e7b51f380'
+            'b7c2856e1f819bb9f9f681c6dde1b6be8ccd7d66690e1bb5f8b6c4e9b9135c7f')
 
 prepare() {
   cd $pkgname-$pkgver
@@ -36,6 +38,7 @@ prepare() {
   patch -p1 -i ../wpa_supplicant_dbus_service_syslog.patch        # Unit improvements from Ubuntu
   patch -p1 -i ../wpa_supplicant_service_ignore-on-isolate.patch  # More unit improvements from Ubuntu
   patch -p1 -i ../add_extra-ies_only_if_allowed_by_driver.patch # http://lists.infradead.org/pipermail/hostap/2022-January/040178.html
+  patch -p1 -i ../wpa_supplicant-allow-legacy-renegotiation.patch
 
   cd $pkgname
   cp "$srcdir/wpa_supplicant_config" ./.config

Edit:
The patch should be equivalent of setting UnsafeLegacyServerConnect in ssl.cnf.

Last edited by loqs (2022-11-05 23:57:49)

Offline

#5 2022-11-06 09:11:10

jerryxiao
Member
Registered: 2019-06-28
Posts: 5

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

You can also stick with openssl 1.1 for now aur/wpa_supplicant-openssl1

Last edited by jerryxiao (2022-11-06 09:12:34)

Offline

#6 2022-11-06 10:08:42

loqs
Member
Registered: 2014-03-06
Posts: 17,363

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

jerryxiao wrote:

You can also stick with openssl 1.1 for now aur/wpa_supplicant-openssl1

diff --git a/PKGBUILD b/PKGBUILD
index f0ab413..d5743ca 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -39,13 +39,11 @@ prepare() {
 
   cd $_pkgbase
   cp "$srcdir/wpa_supplicant_config" ./.config
-
-  sed -i 's/-lssl/-l:libssl.so.1.1/g' Makefile
-  sed -i 's/-lcrypto/-l:libcrypto.so.1.1/g' Makefile
-  export CFLAGS="${CFLAGS} -I/usr/include/openssl-1.1"
 }
 
 build() {
+  CFLAGS+=' -I/usr/include/openssl-1.1'
+  LDFLAGS+=' -L/usr/lib/openssl-1.1'
   cd $_pkgbase-$pkgver/$_pkgbase
 
   make LIBDIR=/usr/lib BINDIR=/usr/bin

Offline

#7 2022-11-06 10:14:53

coddiw0mple
Member
From: Mumbai, India
Registered: 2021-03-13
Posts: 10

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

That doesn't seem to fix it. I am still faced with the same issues.

BUT upon further investigation I found out that my system openssl being used was.....in miniconda???

openssl version gives me

OpenSSL 1.1.1s 

but setting /usr/bin before anaconda in my path changed it back to

OpenSSL 3.0.7 1

Can we assume this is causing issues?

Here is what I get when I do 'whereis openssl'

openssl: /usr/bin/openssl /usr/include/openssl /home/yoda/miniconda3/bin/openssl /usr/share/man/man1/openssl.1ssl.gz

u/YodaTheSexyCummunist

Offline

#8 2022-11-06 10:20:25

loqs
Member
Registered: 2014-03-06
Posts: 17,363

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

You could disable miniconda to remove it as a factor.  Then ensure all the libraries being used are system libraries (lddtree is provided by pax-utils)

lddtree $(which wpa_supplicant)

Offline

#9 2022-11-06 14:43:55

kandscode
Member
Registered: 2021-04-14
Posts: 5

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

I had a similar problem.

22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
22:20:56 wpa_supplicant: OpenSSL: openssl_handshake - SSL_connect error:0A0C0103:SSL routines::internal error
22:20:56 wpa_supplicant: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:internal error
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:smp.ruijie.com.cn
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=smp.ruijie.com.cn' hash=8d9cccb0f62afbc8c96e92141de323a463ef203e34ada60d976bc71a7e0f131f
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=DigiCert Inc/CN=RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1' hash=e6fa484a858940d101978555454aa466531ab6c4abc4ad2b000626aaac0d04f9
22:20:56 kernel: wlan0: Limiting TX power to 21 (24 - 3) dBm as advertised by 0a:74:9c:48:3d:63
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
22:20:56 wpa_supplicant: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
22:20:56 NetworkManager: <info>  [1667744456.2774] device (p2p-dev-wlan0): supplicant management interface state: associating -> associated
22:20:56 kernel: wlan0: associated
22:20:56 NetworkManager: <info>  [1667744456.2330] device (p2p-dev-wlan0): supplicant management interface state: authenticating -> associating
22:20:56 kernel: wlan0: associate with 0a:74:9c:48:3d:63 (try 1/3)
22:20:56 NetworkManager: <info>  [1667744456.2329] device (wlan0): supplicant interface state: authenticating -> associating
22:20:56 kernel: wlan0: authenticated
22:20:56 NetworkManager: <info>  [1667744456.1942] device (p2p-dev-wlan0): supplicant management interface state: scanning -> authenticating
22:20:56 kernel: wlan0: send auth to 0a:74:9c:48:3d:63 (try 1/3)
22:20:53 NetworkManager: <info>  [1667744453.6630] Config: added 'proactive_key_caching' value '1'
22:20:51 gnome-shell: clutter_input_focus_set_surrounding: assertion 'clutter_input_focus_is_focused (focus)' failed
22:20:51 NetworkManager: <warn>  [1667744451.2159] device (wlan0): Activation: (wifi) asking for new secrets
22:20:49 systemd-resolve: Using degraded feature set UDP instead of TCP for DNS server 223.5.5.5.
22:20:42 NetworkManager: <info>  [1667744442.1480] device (p2p-dev-wlan0): supplicant management interface state: disconnected -> scanning
22:20:42 wpa_supplicant: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
22:20:42 kernel: wlan0: deauthenticating from 0a:74:9c:48:3d:63 by local choice (Reason: 3=DEAUTH_LEAVING)
22:20:39 NetworkManager: <info>  [1667744439.7523] device (p2p-dev-wlan0): supplicant management interface state: associating -> associated
22:20:39 wpa_supplicant: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
22:20:39 NetworkManager: <info>  [1667744439.7078] device (p2p-dev-wlan0): supplicant management interface state: authenticating -> associating
22:20:39 wpa_supplicant: wlan0: Trying to associate with 0a:74:9c:48:3d:63 (SSID='CTGU-S-1x' freq=5180 MHz)
22:20:39 NetworkManager: <info>  [1667744439.6689] device (p2p-dev-wlan0): supplicant management interface state: scanning -> authenticating
22:20:39 kernel: wlan0: send auth to 0a:74:9c:48:3d:63 (try 1/3)
22:20:39 systemd-resolve: Using degraded feature set UDP instead of UDP+EDNS0 for DNS server 223.5.5.5.
22:20:35 kernel: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
22:20:35 kernel: audit: type=1131 audit(1667744435.560:222): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
22:20:35 systemd: NetworkManager-dispatcher.service: Deactivated successfully.
22:20:33 gnome-shell: meta_window_set_stack_position_no_sync: assertion 'window->stack_position >= 0' failed
22:20:32 dbus-daemon: [session uid=1000 pid=1105] Successfully activated service 'org.gnome.Logs'
22:20:28 NetworkManager: <info>  [1667744428.1733] device (p2p-dev-wlan0): supplicant management interface state: disconnected -> scanning
22:20:28 wpa_supplicant: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
22:20:25 NetworkManager: <info>  [1667744425.8866] device (p2p-dev-wlan0): supplicant management interface state: associating -> associated
22:20:25 kernel: wlan0: associated
22:20:25 NetworkManager: <info>  [1667744425.8451] device (p2p-dev-wlan0): supplicant management interface state: authenticating -> associating
22:20:25 kernel: wlan0: authenticated
22:20:25 NetworkManager: <info>  [1667744425.8056] device (p2p-dev-wlan0): supplicant management interface state: disconnected -> authenticating
22:20:25 kernel: wlan0: send auth to 0a:74:9c:48:3d:63 (try 1/3)
22:20:25 NetworkManager: <info>  [1667744425.7652] Config: added 'proactive_key_caching' value '1'
22:20:25 systemd-resolve: wlan0: Bus client reset DNS server list.
22:20:25 NetworkManager: <info>  [1667744425.6833] device (wlan0): set-hw-addr: set MAC address to 7A:60:CD:FE:A2:3E (scanning)
22:20:25 wpa_supplicant: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
22:20:25 kernel: audit: type=1130 audit(1667744425.549:221): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
22:20:25 kernel: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
22:20:25 systemd: Started Network Manager Script Dispatcher Service.
22:20:25 dbus-daemon: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
22:20:25 systemd: Starting Network Manager Script Dispatcher Service...
22:20:25 dbus-daemon: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.6' (uid=0 pid=559 comm="/usr/bin/NetworkManager --no-daemon")
22:20:25 NetworkManager: <info>  [1667744425.5051] audit: op="connection-activate" uuid="709b2d20-f036-431b-a6bd-2d697191d6b4" name="CTGU-S-1x" pid=1190 uid=1000 result="success"
22:20:25 kernel: audit: type=1111 audit(1667744425.504:220): pid=559 uid=0 auid=4294967295 ses=4294967295 msg='op=connection-activate uuid=709b2d20-f036-431b-a6bd-2d697191d6b4 name="CTGU-S-1x" pid=1190 uid=1000 result=success exe="/usr/bin/NetworkManager" hostname=? addr=? terminal=? res=success'
22:20:25 kernel: USYS_CONFIG pid=559 uid=0 auid=4294967295 ses=4294967295 msg='op=connection-activate uuid=709b2d20-f036-431b-a6bd-2d697191d6b4 name="CTGU-S-1x" pid=1190 uid=1000 result=success exe="/usr/bin/NetworkManager" hostname=? addr=? terminal=? res=success'
22:20:25 NetworkManager: <info>  [1667744425.5037] device (wlan0): state change: activated -> deactivating (reason 'new-activation', sys-iface-state: 'managed')

I executed the code

lddtree $(which wpa_supplicant)

It produces the following output

/usr/bin/wpa_supplicant (interpreter => /lib64/ld-linux-x86-64.so.2)
    libnl-3.so.200 => /usr/lib/libnl-3.so.200
    libnl-genl-3.so.200 => /usr/lib/libnl-genl-3.so.200
        libgcc_s.so.1 => /usr/lib/libgcc_s.so.1
    libnl-route-3.so.200 => /usr/lib/libnl-route-3.so.200
    libm.so.6 => /usr/lib/libm.so.6
    libssl.so.3 => /usr/lib/libssl.so.3
    libcrypto.so.3 => /usr/lib/libcrypto.so.3
    libdbus-1.so.3 => /usr/lib/libdbus-1.so.3
        libsystemd.so.0 => /usr/lib/libsystemd.so.0
            libcap.so.2 => /usr/lib/libcap.so.2
            libgcrypt.so.20 => /usr/lib/libgcrypt.so.20
                libgpg-error.so.0 => /usr/lib/libgpg-error.so.0
            liblzma.so.5 => /usr/lib/liblzma.so.5
            libzstd.so.1 => /usr/lib/libzstd.so.1
            liblz4.so.1 => /usr/lib/liblz4.so.1

and I don't use python package manager like Anaconda or miniconda

Offline

#10 2022-11-06 14:51:35

kandscode
Member
Registered: 2021-04-14
Posts: 5

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

jerryxiao wrote:

You can also stick with openssl 1.1 for now aur/wpa_supplicant-openssl1

Thanks a lot! This aur package really solved my problem

Offline

#11 2022-11-06 14:52:59

bilabila
Member
Registered: 2018-08-07
Posts: 25
Website

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

aur/wpa_supplicant-openssl1 works for me! Thanks jerryxiao!

After full system upgrade, wired network down. Boot into windows but found no problem.
My attempts:
1. boot into archiso, but can't figure out how to use systemd-networkd + wpa_supplicant to pass PEAP-MSCHAPv2 wired auth.
2. use OPENSSL_CONF conf to allow unsafe auth as discussed in ubuntu forum. 0A0C0103 error still.
3. use a windows laptop as a router to access internet, install wpa_supplicant-openssl1, reboot system(only reboot wpa_supplicant and NetworkManager service cause long time auth and no dns), works as before.

Offline

#12 2022-11-06 15:23:41

coddiw0mple
Member
From: Mumbai, India
Registered: 2021-03-13
Posts: 10

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

jerryxiao wrote:

You can also stick with openssl 1.1 for now aur/wpa_supplicant-openssl1

Wow this worked! I feel stupid not thinking about something like this.  Thanks, lots more to learn for me smile


u/YodaTheSexyCummunist

Offline

#13 2022-11-06 16:31:37

mcloaked
Member
From: Yorkshire, UK
Registered: 2012-02-02
Posts: 1,240

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

In addition there is also the core package core/openssl-1.0 1.0.2.u-1


Mike C

Offline

#14 2022-11-06 17:30:51

coddiw0mple
Member
From: Mumbai, India
Registered: 2021-03-13
Posts: 10

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

mcloaked wrote:

In addition there is also the core package core/openssl-1.0 1.0.2.u-1

Already tried it but it doesn't replace your openssl as many apps are now built for openssl3


u/YodaTheSexyCummunist

Offline

#15 2022-11-09 15:39:02

foutrelis
Developer
From: Athens, Greece
Registered: 2008-07-28
Posts: 705
Website

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

wpa_supplicant 2:2.10-7 should work again, give it a try.

Offline

#16 2023-06-19 09:07:21

joanmanel
Member
Registered: 2012-11-06
Posts: 234

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

foutrelis wrote:

wpa_supplicant 2:2.10-7 should work again, give it a try.

It was working for me, but now it stopped working again. I am on wpa_supplicant 2.10-8

Offline

#17 2023-06-19 18:29:23

Kobold
Member
Registered: 2022-05-18
Posts: 2

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

joanmanel wrote:
foutrelis wrote:

wpa_supplicant 2:2.10-7 should work again, give it a try.

It was working for me, but now it stopped working again. I am on wpa_supplicant 2.10-8

The package openssl 3.1.1-1 broke wpa_supplicant again, resulting to you having the choice to either switch to a non WPA2 Enterprise network, or downgrading to openssl 3.0.9-1 until the point either openssl or wpa_supplicant will be fixed. Issue with downgrading is, all openssl depending applications will break.

Offline

#18 2023-06-19 18:47:19

loqs
Member
Registered: 2014-03-06
Posts: 17,363

Re: [SOLVED] Update to openssl 3 breaks WPA2 Enterprise networks

Kobold wrote:

The package openssl 3.1.1-1 broke wpa_supplicant again, resulting to you having the choice to either switch to a non WPA2 Enterprise network, or downgrading to openssl 3.0.9-1 until the point either openssl or wpa_supplicant will be fixed. Issue with downgrading is, all openssl depending applications will break.

For other options see https://bbs.archlinux.org/viewtopic.php?id=286417

Offline

Board footer

Powered by FluxBB