OpenSSL started using TLS v1.1 and v1.2 as default from a commit back in November 2014. Not all RADIUS servers (which are used for authentication) can handle TLS v1.2, described here.
The problem can be avoided by setting the right flags, but most network managers
(at least NetworkManager
and wicd
) does not have a way to do this. (bug
report here)
There has been a bugfix regarding the commit mentioned above, but this happened less than a month later so is probably applied in the same release.
The workaround is to use the command line tools for eduroam, so you can set the flags yourself.
This guide assumes you are running Ubuntu 16.04 (and that you are at the University of Copenhagen).
You need to create a file that will contain the configuration for eduroam (remember to fill in your own details) --
eduroam.conf
:
ctrl_interface=/run/wpa_supplicant
network={
ssid="eduroam"
key_mgmt=WPA-EAP
pairwise=CCMP
group=CCMP TKIP
eap=PEAP
domain_suffix_match="radius.ku.dk"
identity="<abc123>@ku.dk"
password="YOUR-PASSWORD-AS-PLAINTEXT"
phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1"
phase2="auth=MSCHAPV2"
}
Then each time you want to connect, do the following (run iwconfig
to find the
name of your wireless interface)
sudo systemctl stop NetworkManager.service
2. Connect to the wireless network (this process will continue to live as long as you are connected)
sudo wpa_supplicant -i <wireless-interface> -c eduroam.conf
you can probably use something else like dhcpd
)
sudo dhclient <wireless-interface>
the file /etc/resolv.conf
by hand to make
sed -e 's/127.0.1.1/8.8.8.8/' /etc/resolv.conf | sudo tee /etc/resolv.conf