Your message dated Sat, 15 Dec 2018 14:43:01 +0000
with message-id <e1gyb9h-000cbg...@fasolo.debian.org>
and subject line Bug#907518: fixed in wpa 2:2.6-19
has caused the Debian Bug report #907518,
regarding openssl 1.1.1~~pre9-1 breaks connection to some wifi networks, such
as eduroam
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
907518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907518
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wpasupplicant
Version: 2:2.6-18
Severity: important
With libssl1.1 1.1.1~~pre9-1, which more aggressively deprecates smaller
key sizes by default, I can no longer connect to my office wifi network:
wpa_supplicant[523]: OpenSSL: pending error: error:0D07803A:asn1 encoding
routines:asn1_item_embed_d2i:nested asn1 error
wpa_supplicant[523]: OpenSSL: pending error: error:140C800D:SSL
routines:SSL_use_certificate_file:ASN1 lib
wpa_supplicant[523]: OpenSSL: pending error: error:140C618E:SSL
routines:SSL_use_certificate:ca md too weak
wpa_supplicant[523]: TLS: Failed to set TLS connection parameters
wpa_supplicant[523]: EAP-TLS: Failed to initialize SSL.
wpa_supplicant[523]: wlp4s0: EAP: Failed to initialize EAP method: vendor 0
method 13 (TLS)
Downgrading libssl1.1 to 1.1.0h-4 allows me to connect again. Please
adjust the defaults that wpasupplicant initializes OpenSSL with to
continue to allow connecting to such networks.
-- System Information:
Debian Release: buster/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.17.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages wpasupplicant depends on:
ii adduser 3.117
ii libc6 2.27-5
ii libdbus-1-3 1.12.10-1
ii libnl-3-200 3.4.0-1
ii libnl-genl-3-200 3.4.0-1
ii libpcsclite1 1.8.23-3
ii libreadline7 7.0-5
ii libssl1.1 1.1.1~~pre9-1
ii lsb-base 9.20170808
wpasupplicant recommends no packages.
Versions of packages wpasupplicant suggests:
pn libengine-pkcs11-openssl <none>
pn wpagui <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2:2.6-19
We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 907...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andrej Shadura <andre...@debian.org> (supplier of updated wpa package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 15 Dec 2018 15:21:08 +0100
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2:2.6-19
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers <w...@packages.debian.org>
Changed-By: Andrej Shadura <andre...@debian.org>
Description:
hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
wpagui - graphical user interface for wpa_supplicant
wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 907518 911297
Changes:
wpa (2:2.6-19) unstable; urgency=medium
.
[ Ondřej Nový ]
* d/copyright: Use https protocol in Format field
* d/changelog: Remove trailing whitespaces
.
[ Andrej Shadura ]
* Re-enable TLSv1.0 and security level 1 for wpasupplicant.
(Closes: #907518, #911297).
* Modernise debian/rules.
Checksums-Sha1:
8e4c2e7df665b54f9b724f16f78c68327bc28015 2139 wpa_2.6-19.dsc
99453ab35df6a9da552ac9db280b378f3b4f717b 102696 wpa_2.6-19.debian.tar.xz
Checksums-Sha256:
8e5a3786a10d4248eb6bbdbaf1c6d38979b7a44c0dff97ca5113d284349ecaf8 2139
wpa_2.6-19.dsc
65556792478de4ffdd65cf6ac4eb4a6abe4c0382b7e60e82171b35c132255fb2 102696
wpa_2.6-19.debian.tar.xz
Files:
a14318544fb28a874b54ae99de417fac 2139 net optional wpa_2.6-19.dsc
2b9c2842c841babd6344218b33657d0b 102696 net optional wpa_2.6-19.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEeuS9ZL8A0js0NGiOXkCM2RzYOdIFAlwVEJ4ACgkQXkCM2RzY
OdKhKAgAvuLZHtk3cwiTbJ0or7B2wQni0idqfpU0Q7wl8QQWEYANR3mzt047Pn/c
NWMur7BtdvjES3MMBptWcNpoL5Ai8WWi+NRoLtDZYsXrtzdmsClgx8YFhvctrtI5
FcLKTzrbV1BaePs36hkbAWfpzbAFp603PZXd4eFNj6zsLxzUd5uzG3YMXUIb2TTL
ABxpR11Wot+b6EPOkY7Kv0BnPqsyJBViLrF8ElHyc6UUIp0+och82TAFOMGyvnp5
n3Fwm0tEmbqqUXqevXrAZsN/4tFSaCcQMCS29O4JqQPckqdGx32af4anjuXzgAS6
RyYNqVOVFhuvXMaqwGwMVs2AXQcCpA==
=mwBE
-----END PGP SIGNATURE-----
--- End Message ---