Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#76474 - [wpa_supplicant] [networkmanager] won't connect to WPA2 Enterprise after update to openssl 3

Attached to Project: Arch Linux
Opened by Nikolay Nechaev (kolay.ne) - Monday, 07 November 2022, 14:35 GMT
Last edited by Evangelos Foutras (foutrelis) - Wednesday, 09 November 2022, 15:02 GMT
Task Type Bug Report
Category Packages: Extra
Status Closed
Assigned To Jan Alexander Steffens (heftig)
Morten Linderud (Foxboron)
Architecture x86_64
Severity Low
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 2
Private No

Details

On 2022.11.05 an update of openssl (version openssl-3.0.7-2) was released. Starting with that packages state, I am unable to connect to a network with WPA/WPA2 Enterprise security: the command
`nmcli d w c UniversityStudent`
, after a long delay, terminates with the error "Connection activation failed: (7) Secrets were required, but not provided."

If I switch to the mirror https://archive.archlinux.org/repos/2022/11/04/$repo/os/$arch, downgrade all packages with `pacman -Syyuu`, and reboot, everything works fine just like before the update.

Another notable package that was updated that day is wpa_supplicant-2:2.10-5 -> wpa_supplicant-2:2.10-6.

The corresponding /etc/NetworkManager/system-connections/UniversityStudent.nmconnection file is attached.
This task depends upon

Closed by  Evangelos Foutras (foutrelis)
Wednesday, 09 November 2022, 15:02 GMT
Reason for closing:  Fixed
Additional comments about closing:  wpa_supplicant 2:2.10-7
Comment by loqs (loqs) - Monday, 07 November 2022, 16:16 GMT
Have you looked at https://bbs.archlinux.org/viewtopic.php?id=281039
I would suggest trying [1], the option was broken before 3.0.4 but should be working now in 3.0.7.

[1] https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1963834/comments/4
Comment by Evangelos Foutras (foutrelis) - Monday, 07 November 2022, 20:26 GMT
Enabling that option system-wide is not ideal. This comment explains the possible workarounds in more detail: https://bugzilla.redhat.com/show_bug.cgi?id=2072070#c24

We should probably adopt the patch to wpa_supplicant proposed in the above comment. Fedora and Debian seem to apply it as well.

wpa_supplicant upstream has two relevant commits: https://w1.fi/cgit/hostap/log/?qt=grep&q=5746 -- I believe those would allow enabling unsafe renegotiation on a per connection basis, though I'm not sure if NetworkManager can pass custom options to wpa_supplicant. Might still be better to apply the immediate fix above and revert it once a more granular selection has been implemented in NetworkManager.
Comment by loqs (loqs) - Monday, 07 November 2022, 20:44 GMT
Applying the Fedora fix was reported not to solve the issue [1], perhaps it was not applied correctly?
Edit:
NetworkManager did support the option then reverted support [2]

[1] https://bbs.archlinux.org/viewtopic.php?pid=2066306#p2066306
[2] https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/commit/3117198f157835506eb1819937b01d68c9e36038
Comment by Nikolay Nechaev (kolay.ne) - Tuesday, 08 November 2022, 11:48 GMT
Neither https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1963834/comments/4, nor suggestion from https://bbs.archlinux.org/viewtopic.php?id=281039, not involving AUR (that is, changing configuration files suggested in #22 and #36 of https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1958267) resolved the problem for me.
Comment by Evangelos Foutras (foutrelis) - Tuesday, 08 November 2022, 12:08 GMT
Does this package work? https://pkgbuild.com/~foutrelis/wpa_supplicant-legacy-server-connect/

Edit: Make sure that the new package is used by stopping wpa_supplicant.service if previously running.
Comment by Paul Stodghill (pvstodghill) - Tuesday, 08 November 2022, 13:32 GMT Comment by Evangelos Foutras (foutrelis) - Tuesday, 08 November 2022, 13:44 GMT
Care to test the package linked in my previous comment?
Comment by Paul Stodghill (pvstodghill) - Tuesday, 08 November 2022, 15:38 GMT
@foutrelis: Your "wpa_supplicant-legacy-server-connect" package also appears to fix the problem. Thank you very much for your help.
Comment by Evangelos Foutras (foutrelis) - Tuesday, 08 November 2022, 16:29 GMT
Thanks a lot for the confirmation. I'll leave it up to Morten to decide if we want to include the patch or not. However, I can't see a better way to address this in the short term (until upstream NetworkManager and hostap decide on how to implement the relevant option).
Comment by Nikolay Nechaev (kolay.ne) - Tuesday, 08 November 2022, 20:10 GMT
The wpa_supplicant by @foutrelis did not work for me (https://asciinema.org/a/ntgRQZWcOlkzp71G4Ykv17aeK). wpa_supplicant-openssl1 fixed the issue.
Comment by Evangelos Foutras (foutrelis) - Tuesday, 08 November 2022, 20:35 GMT
That's unfortunate. Anything useful in 'journalctl -u wpa_supplicant' when it fails to connect?
Comment by Nikolay Nechaev (kolay.ne) - Wednesday, 09 November 2022, 09:30 GMT
Here is the log it produces starting with `nmcli d w c UniversityStudent` until it terminates with the error
Comment by Dragoon Aethis (DragoonAethis) - Wednesday, 09 November 2022, 10:15 GMT
I had the same issue and Foutrelis' package fixed it for me.

Failure log for reference: https://gist.github.com/DragoonAethis/ee03d345d8d3dd42b12286455d9cf10b
Comment by Evangelos Foutras (foutrelis) - Wednesday, 09 November 2022, 11:36 GMT
@Nikolay: Please test this package as well:

https://pkgbuild.com/~foutrelis/wpa_supplicant-lower-security-level-for-tls-1/

It contains one more fix for OpenSSL 3.0. [1]

[1] https://w1.fi/cgit/hostap/commit/src/crypto/tls_openssl.c?id=bc99366f9b96

@Dragoon: Thanks for the log, it confirms that we're dealing with two different issues and that the previous fix works for one of them.
Comment by Nikolay Nechaev (kolay.ne) - Wednesday, 09 November 2022, 14:22 GMT
Yes, I successfully connect with the latter package
Comment by Evangelos Foutras (foutrelis) - Wednesday, 09 November 2022, 15:02 GMT
Thanks for the feedback, pushed both patches to [testing] as wpa_supplicant 2:2.10-7.

Loading...