Enable WPA Enterprise to old RADIUS servers again - allow wpasupplicant's openssl_ciphers to be configured from NetworkManager.
Description of the feature
Allow openssl_ciphers configuration option of wpasupplicant, to be configured in NetworkManager
Description of the use cases
- Openssl moved some ciphers among SECLEVELs again (don't get me wrong, that is not bad thing per se).
- Debian compiles wpasupplicant by default openssl_ciphers=DEFAULT@SECLEVEL=1 (again this is not bad thing per se)
- Windows 2008 Active Directory servers do not provide ciphers that are in current DEFAULT@SECLEVEL=1 openssl list, thus WPA Enterprise authentication (both wifi and wired) is failing We do not want user to compromise security on all other connections because they need to connect to one old network.
References and other resources
I created merge request on github https://github.com/NetworkManager/NetworkManager/pull/368, then I realized that all tracking is done here on freedesktop gitlab. I'm new here, thus I don't know how to fork and create pullrequest here (my fork button is greyed out).
Edited by Tomáš Ebenlendr