Bug#667706: [pkg-wpa-devel] Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2014-05-23 Thread Pablo Mazzini
Hi, I have tried using the wpa_supplicant 2.1 release and I can no longer reproduce this bug. I think it was fixed in the 2.0 one, this is a meaningful extract from the 2.0 changelog: * added mechanism to disable TLS Session Ticket extension - a workaround for servers that

Bug#667706: [pkg-wpa-devel] Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-08-13 Thread Stefan Lippers-Hollmann
Control: forcemerge 561081 -1 Hi On Monday 13 August 2012, Raghav Krishnapriyan wrote: > Applying the upstream patch Ben Kay refers to above fixes the problem for me. That is not an "upstream patch" (as in, it's neither appled upstream nor condoned to be used on production systems), but merely

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-08-13 Thread Raghav Krishnapriyan
Applying the upstream patch Ben Kay refers to above fixes the problem for me. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#667706: [Pkg-openssl-devel] Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-07-23 Thread Kurt Roeckx
reassign 667706 wpasupplicant thanks On Mon, Jul 23, 2012 at 01:47:21PM -0400, Benjamin Kay wrote: > No luck on the openssl front, but a patch to wpa_supplicant that disables TLS > session tickets does the trick for me. See > http://w1.fi/bugz/show_bug.cgi?id=447 So I'm going to reassign this

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-07-23 Thread Benjamin Kay
No luck on the openssl front, but a patch to wpa_supplicant that disables TLS session tickets does the trick for me. See http://w1.fi/bugz/show_bug.cgi?id=447 I've attached a debdiff against wpa. diff -Nru wpa-1.0/debian/changelog wpa-1.0/debian/changelog --- wpa-1.0/debian/changelog 2012-05-13 1

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-05-29 Thread Benjamin Kay
On Monday, April 30, 2012 20:15:26 Raghav Krishnapriyan wrote: > On Sun, Apr 29, 2012, at 07:26:11 pm +0200, Kurt Roeckx wrote: > >Can you please try with the 1.0.1b version? > > 1.0.1b still results in the same problem, unfortunately. > FYI, 1.0.1c (the most current version at the time of this w

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-04-30 Thread Raghav Krishnapriyan
On Sun, Apr 29, 2012, at 07:26:11 pm +0200, Kurt Roeckx wrote: Can you please try with the 1.0.1b version? 1.0.1b still results in the same problem, unfortunately. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas.

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-04-29 Thread Kurt Roeckx
On Thu, Apr 05, 2012 at 05:37:46PM -0700, Raghav Krishnapriyan wrote: > The wpa_supplicant log and packet trace are attached. Can you please try with the 1.0.1b version? Kurt -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Cont

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-04-05 Thread Raghav Krishnapriyan
The wpa_supplicant log and packet trace are attached. tcpdump.pcap Description: application/vnd.tcpdump.pcap ioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument Initializing interface 'wlan0' conf '/var/lib/wicd/configurations/00211cff6c30' driver 'default' ctrl_

Bug#667706: openssl 1.0.1 breaks wpa_supplicant

2012-04-05 Thread Raghav Krishnapriyan
Package: openssl Version: 1.0.1-4 Severity: important Dear Maintainer, PEAP authentication through wpa_supplicant fails after upgrading to openssl 1.0.1. The issue seems to be that the RADIUS server is rejecting the hello. Downgrading to openssl 1.0.0h-1 fixes the problem. The relevant section