Hi,
I have tried using the wpa_supplicant 2.1 release and I can no longer
reproduce this bug.
I think it was fixed in the 2.0 one, this is a meaningful extract from
the 2.0 changelog:
* added mechanism to disable TLS Session Ticket extension
- a workaround for servers that
Control: forcemerge 561081 -1
Hi
On Monday 13 August 2012, Raghav Krishnapriyan wrote:
> Applying the upstream patch Ben Kay refers to above fixes the problem for me.
That is not an "upstream patch" (as in, it's neither appled upstream
nor condoned to be used on production systems), but merely
Applying the upstream patch Ben Kay refers to above fixes the problem for me.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
reassign 667706 wpasupplicant
thanks
On Mon, Jul 23, 2012 at 01:47:21PM -0400, Benjamin Kay wrote:
> No luck on the openssl front, but a patch to wpa_supplicant that disables TLS
> session tickets does the trick for me. See
> http://w1.fi/bugz/show_bug.cgi?id=447
So I'm going to reassign this
No luck on the openssl front, but a patch to wpa_supplicant that disables TLS
session tickets does the trick for me. See http://w1.fi/bugz/show_bug.cgi?id=447
I've attached a debdiff against wpa.
diff -Nru wpa-1.0/debian/changelog wpa-1.0/debian/changelog
--- wpa-1.0/debian/changelog 2012-05-13 1
On Monday, April 30, 2012 20:15:26 Raghav Krishnapriyan wrote:
> On Sun, Apr 29, 2012, at 07:26:11 pm +0200, Kurt Roeckx wrote:
> >Can you please try with the 1.0.1b version?
>
> 1.0.1b still results in the same problem, unfortunately.
>
FYI, 1.0.1c (the most current version at the time of this w
On Sun, Apr 29, 2012, at 07:26:11 pm +0200, Kurt Roeckx wrote:
Can you please try with the 1.0.1b version?
1.0.1b still results in the same problem, unfortunately.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas.
On Thu, Apr 05, 2012 at 05:37:46PM -0700, Raghav Krishnapriyan wrote:
> The wpa_supplicant log and packet trace are attached.
Can you please try with the 1.0.1b version?
Kurt
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Cont
The wpa_supplicant log and packet trace are attached.
tcpdump.pcap
Description: application/vnd.tcpdump.pcap
ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Initializing interface 'wlan0' conf '/var/lib/wicd/configurations/00211cff6c30'
driver 'default' ctrl_
Package: openssl
Version: 1.0.1-4
Severity: important
Dear Maintainer,
PEAP authentication through wpa_supplicant fails after upgrading to openssl
1.0.1. The issue seems to be that the RADIUS server is rejecting the hello.
Downgrading to openssl 1.0.0h-1 fixes the problem.
The relevant section
10 matches
Mail list logo