On Fri, 16 Nov 2018 at 09:36, Sam Morris <s...@robots.org.uk> wrote:
>
> Package: wpasupplicant
> Version: 2:2.4-1+deb9u1
> Followup-For: Bug #911297
>
> See /usr/share/doc/libssl1.1/NEWS.Debian.gz and try editing the end of
> /etc/ssl/openssl.cnf:
>
> MinProtocol = None
> CipherString = DEFAULT
>
> I believe OpenSSL clients can call SSL_CONF_cmd(3ssl) in order to
> change the new defaults (TLSv1.2, security level 2) back to something
> more permissive. wpasupplicant should probably be doing this because
> enterprise networks are not going to upgrade to anything as new as
> TLSv1.2 (2008) overnight.
>
> For bonus points, the minimum TLS version and CipherString could be
> exposed in NetworkManager's GUI and passed down to wpasupplicant, but
> that's way too much work given that we're about to freeze for buster!

This bug seems to be a dup for #907518. There’s a user-configurable
setting for wpa_supplicant already, and I’m not sure it’s a very good
idea to make this a default.

-- 
Cheers,
  Andrej

Reply via email to