<div dir="ltr">More specifically, here's the debug output:<div><br></div><div>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL Handling EAP type 1 (Identity), code: 2 (Response), identifier: 191, length: 20<br>Fri Oct 21 14:52:17 2022: DEBUG: Initialised SSL library: Net::SSLeay 1.92, OpenSSL 1.1.1o-freebsd 3 May 2022<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x9 (9) for Net::SSLeay constant ERROR_WANT_ASYNC<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0xa (10) for Net::SSLeay constant ERROR_WANT_ASYNC_JOB<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0xb (11) for Net::SSLeay constant ERROR_WANT_CLIENT_HELLO_CB<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0xc (12) for Net::SSLeay constant ERROR_WANT_RETRY_VERIFY<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x8 (8) for Net::SSLeay constant SSL2_MT_CLIENT_CERTIFICATE<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x3 (3) for Net::SSLeay constant SSL2_MT_CLIENT_FINISHED<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x2 (2) for Net::SSLeay constant SSL2_MT_CLIENT_MASTER_KEY<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x0 (0) for Net::SSLeay constant SSL2_MT_ERROR<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x6 (6) for Net::SSLeay constant SSL2_MT_REQUEST_CERTIFICATE<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x6 (6) for Net::SSLeay constant SSL2_MT_SERVER_FINISHED<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x4 (4) for Net::SSLeay constant SSL2_MT_SERVER_HELLO<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x5 (5) for Net::SSLeay constant SSL2_MT_SERVER_VERIFY<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x2 (2) for Net::SSLeay constant TLSEXT_ERR_ALERT_FATAL<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x1 (1) for Net::SSLeay constant TLSEXT_ERR_ALERT_WARNING<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x3 (3) for Net::SSLeay constant TLSEXT_ERR_NOACK<br>Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x0 (0) for Net::SSLeay constant TLSEXT_ERR_OK<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL setting TLS protocols to: TLSv1.3<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL setting EAPTLS_Ciphers to: DEFAULT:!EXPORT:!LOW@SECLEVEL=1<br>Fri Oct 21 14:52:17 2022: DEBUG: EAP result: 3, EAP-TTLS Challenge<br>Fri Oct 21 14:52:17 2022: DEBUG: Radius::AuthGROUP: result: CHALLENGE, EAP-TTLS Challenge<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthBy GROUP result: CHALLENGE, EAP-TTLS Challenge<br>Fri Oct 21 14:52:17 2022: DEBUG: Access challenged for <....>: EAP-TTLS Challenge<br></div><div><br></div><div><br></div>Fri Oct 21 14:52:17 2022: DEBUG: Handling with Radius::AuthGROUP: <br>Fri Oct 21 14:52:17 2022: DEBUG: Handling with AuthSQL<br>Fri Oct 21 14:52:17 2022: DEBUG: Handling with Radius::AuthSQL: <br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL Handling EAP type 21 (TTLS), code: 2 (Response), identifier: 192, length: 196<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: before SSL initialization<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: before SSL initialization<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: before SSL initialization<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake: Direction IN, Version: TLS 1.3, Record content: (22) Handshake, message type: (1) ClientHello<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake: Direction OUT, Version: TLS 1.2, Record content: (21) Alert, level: (2) fatal, description: (70) protocol version<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: error<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: error<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS SSL_accept result: -1, reason/error: 'SSL_ERROR_SSL, state: 'error'<br>Fri Oct 21 14:52:17 2022: ERR: AuthSQL EAP-TTLS TLS Handshake error: result: -1, reason/error: 'SSL_ERROR_SSL', state: 'error', error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP Failure, elapsed time 0.050957<br>Fri Oct 21 14:52:17 2022: DEBUG: EAP result: 1, EAP-TTLS TLS Handshake error: unsupported protocol<br>Fri Oct 21 14:52:17 2022: DEBUG: Radius::AuthGROUP: result: REJECT, EAP-TTLS TLS Handshake error: unsupported protocol<br>Fri Oct 21 14:52:17 2022: DEBUG: AuthBy GROUP result: REJECT, EAP-TTLS TLS Handshake error: unsupported protocol<br>Fri Oct 21 14:52:17 2022: INFO: Access rejected for 888901007406545: EAP-TTLS TLS Handshake error: unsupported protocol<br><div><br></div><div>We're running OpenSSL 1.1.1o and Net:SSLeay 1.92 as detailed above.<br></div><div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Oct 21, 2022 at 1:39 PM Cassidy B. Larson <<a href="mailto:alandaluz@gmail.com">alandaluz@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><div dir="ltr">We're spinning up a new EAP-TTLS source. Installed latest dev of 4.26-24. When I force EAP_TLS_Protocols to TLSv1.3 alone, I see the TLSv1.3 handshake request come in, but outbound handshake is TLSv1.2. Apparently our vendor only allows TLSv1.3 right now.<div><br></div><div>Any ideas how to get outbound handshakes to use TLSv1.3?</div><div><br style="color:rgb(0,0,0)"><span style="color:rgb(29,28,29);font-family:Monaco,Menlo,Consolas,"Courier New",monospace;font-size:12px;font-variant-ligatures:none;white-space:pre-wrap;background-color:rgba(29,28,29,0.04)">Fri Oct 21 13:30:12 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake: Direction IN, Version: TLS 1.3, Record content: (22) Handshake, message type: (1) ClientHello
Fri Oct 21 13:30:12 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake: Direction OUT, Version: TLS 1.2, Record content: (21) Alert, level: (2) fatal, description: (70) protocol version</span><br></div><div><br></div><div><br></div><div><div>Thanks!</div></div><div><br></div><div>-c</div></div>
</blockquote></div>