[pkg-wpa-devel] Bug#667706: Bug#667706: openssl 1.0.1 breaks wpa_supplicant

Stefan Lippers-Hollmann s.L-H at gmx.de
Mon Aug 13 21:30:50 UTC 2012


Control: forcemerge 561081 -1

Hi

On Monday 13 August 2012, Raghav Krishnapriyan wrote:
> Applying the upstream patch Ben Kay refers to above fixes the problem for me.

That is not an "upstream patch" (as in, it's neither appled upstream 
nor condoned to be used on production systems), but merely a debugging 
patch, to find out where the remote RADIUS implementation fails. As far
as I understand the buglog so far, and I have no access to those 
failing networks, neither wpa_supplicant nor openssl are actually 
misbehaving. Rather than a bug in Debian, it appears that this 
particular commercial (apparently from Aruba) is behaving in a weird
way that breaks interoperability.

At this moment it is not clear if wpasupplicant/ openssl or the remote 
RADIUS implementation is at fault. Given that none of the Debian 
wpasupplicant maintainers have access to affected networks, the best 
curse of action is to work with upstream to debug this further. Maybe
there is a safe way to work around this quirky RADIUS implementation,
maybe there is an actual problem that needs to be fixed in that RADIUS
implementation. However just blindly disabling those checks might 
create more problems than it does solve.

Regards
	Stefan Lippers-Hollmann
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.alioth.debian.org/pipermail/pkg-wpa-devel/attachments/20120813/edb7c575/attachment.pgp>


More information about the Pkg-wpa-devel mailing list