** Changed in: network-manager-applet (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1473088
Title:
network manager peap mschapv2 authentication stopped w
Apparently Aerohive is one of the companies that has not released new firmware
for their access point, and have known about it for a few months:
https://community.aerohive.com/aerohive/topics/dh-key-too-small
If you found them or any other not to have a patch in place, please contact
their suppor
Still an issue on 14.10 with wpa_supplicant 2.3.
It seems to be cause by SSL enforcing a higher DH key length (>768 bit).
Although I tried the non-updated version 1.0.1f (0.9 instead of 0.9.8) the
behaviour is still the same.
Should indeed be fixed on the server side, a new DH key should be gener
I cannot imagine Canonical is benefiting from this Enterprise Authentication
not working.
Is there any way to escalate this to Canonical?
I am sure if they are aware it may get some priority?
We really need a work around.
I may really need to leave the distro otherwise, just for the sake of workin
I also tried https://packages.debian.org/sid/wpasupplicant (2.3 debian
package), rebooted and tried, but no luck.
Might it be OpenSSL related? Seems an Ubuntu issue still, on Fedora it seems to
work with 2.3 and openssl1.0k .
I did not find a newer package quickly, and I do not want to start comp
I am running Ubuntu 14.04 LTS with 2.1-0ubuntu1.3 for wpasupplicant so
not sure if that is it?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1473088
Title:
network manager peap mschapv2 authenticati
According to a RH bug description, the problem lies on the server side
of connection.
Quote: " wpa_supplicant 2.4 may trigger this where 2.3 would not,
becuase 2.4 enables some new ciphers for use with TLSv1.2, and the
server may have enabled DH only for those ciphers that are now enabled.
The op
I tried this by doing :
sudo apt-get install linux-generic-lts-vivid
I got :
3.19.0-26 as a kernel.
Rebooted and tried, but I have the same issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1473088
Somebody posted this in the other bug report:
Jiminy crickets, kernel upgrade to 3.19.0-23 and EDUROAM is picking up again!
I have not had time to test it yet, maybe anyone else can try that and
post back?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is su
affects me too. I am available to give support for debug!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1473088
Title:
network manager peap mschapv2 authentication stopped working
To manage notific
Not sure. When I try the wpa_supplicant config workaround, I get all kinds of
SSL errors, with or without ca_cert option.
Tried a SSL downgrade with no success just to test.
OpenSSL: openssl_handshake - SSL_connect error:14082174:SSL
routines:SSL3_CHECK_CERT_AND_ALGORITHM:dh key too small
and ano
This would indicate it is an upstream bug, after all. Is there anybody
able to try the same with Vivid?
I might be wrong, but I don't believe this is wpa-supplicant-related,
because there were reports of being able to connect manually with wpa-
supplicant, from CLI. So it is most likely NetworkMan
A colleague of mine reports this is broken in Fedora 22 too after fully
upgrading to the latest packages.
He did a reinstall and did not upgrade the following packages:
- wpa-supplicant
- network-manager-ovpnc
Then in kept working.
So maybe something was changed upstream that broke this?
--
You mean the ignore CA certificate checkbox? On my system it seems to work
fine. If checked, it doesn't ever ask for a cert; in the edit connections
window, under the wireless security tab, the "No CA certificate is required"
checkbox remains checked; and there is no mention of CA certs in
/etc
I agree, note that the ignore always checkbox still does not work.
Our connection does not require a certificate and it simply works on Android
and Fedora Linux.
Quite some users posted this not working since a few weeks, it might be a
firmware change or kernel update.
I was unable to figure out
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: network-manager-applet (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/14730
I don't believe this is certificate-related this time. In the linked bug
Zacharias Steinmetz says: "Same on my PC running Vivid (3.19.0-22,
BCM4313), both with certificate added and ignored."
In my case, it is a Toshiba Satellite C50-B-15N with Vivid 64, same
kernel version as Zacharias, but a Qua
** Attachment added: "wireless report"
https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1473088/+attachment/4427005/+files/wireless-info.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
Certificate checkbox to keep ignoring does not work either by the way.
Ran this wireless info script:
https://raw.githubusercontent.com/UbuntuForums/wireless-info/master/wireless-info
change the file to some other name, it writes to that name.
Please find my info attached, removed some info that
19 matches
Mail list logo