https://discord.com/channels/886329492438671420/927008236584984587/1118264423350546514 earlyshell /sbin/ifconfig igb0 ether "RG MAC" && /root/wpa_supplicant -B -Dwired -i igb0 -c /root/wpa_supplicant.conf -P/var/run/wpa_supplicant.pid && sleep 10 && /usr/sbin/wpa_cli logon shellcmd wpa_cli logoff && sleep 10 && wpa_cli logon wpa_sup https://discord.com/channels/886329492438671420/927008236584984587/1162122299445616650 openssl 3.0 related put this in an openssl.conf file: openssl_conf = openssl_init [openssl_init] ssl_conf = ssl_sect [ssl_sect] system_default = system_default_sect [system_default_sect] Options = UnsafeLegacyRenegotiation MinProtocol = TLSv1 CipherString = DEFAULT@SECLEVEL=0 and run supplicant with it: /usr/bin/env OPENSSL_CONF=/path/to/openssl.conf /usr/sbin/wpa_supplicant ... just not pasting the other params but put yours here ... https://discord.com/channels/886329492438671420/1005613537382637661/1169647208237375518 more openssl 3.0 related at&t wpa_supplicant.conf that works for people who are on openssl3 and latest wpa_supplicant that supports the allow_unsafe_renegotiation parameter in phase1 ------- ctrl_interface=DIR=/var/run/wpa_supplicant eapol_version=1 ap_scan=0 fast_reauth=1 openssl_ciphers=DEFAULT@SECLEVEL=0 network={ ca_cert="/etc/wpa/ca.pem" client_cert="/etc/wpa/client.pem" private_key="/etc/wpa/private.pem" identity="XX:XX:XX:XX:XX:XX" eap=TLS eapol_flags=0 key_mgmt=IEEE8021X phase1="allow_canned_success=1 allow_unsafe_renegotiation=1" } --------- https://discord.com/channels/886329492438671420/927008236584984587/11621357507672 ??????