On Mon, 3 Sep 2018 22:24:29 +0200 Kurt Roeckx <k...@roeckx.be> wrote:
> The fix it to tell your administrator to use 2048 (or more) bit
> keys. I assume there are certificates on both sides, so they both
> need to get replaced.
>
> You can work around this issue by putting something like this in
> your config file:
> openssl_ciphers=DEFAULT@SECLEVEL=1

Dear kurt, thanks a lot for the quick reply. Unfortunately:

1. Administrators of big organizations are usually reluctant to change
their certificates
2. The suggested workaround works (thanks again) for wpa_supplicant but
NetworkManager (which is used by most linux distros) cannot pass the
"openssl_ciphers" flag to wpa_supplicant.

On the other hand, starting from your suggestion, I found a workaround that
changes the cipher globally. I report it below for other users.

It is just a matter of editing file /etc/ssl/openssl.cnf changing last line
from:
CipherString = DEFAULT@SECLEVEL=2
to
CipherString = DEFAULT@SECLEVEL=1

I know, this impact the global security of your linux box, but it was the
standard up to August, when OpenSSL 1.1.1 was released, so it should not be
a big problem for most users :-)

  Gianpaolo

Reply via email to