This seems to be a catch-all for technical questions, so my apologies if I am not posting in the right location. It's been difficult to figure out how to obtain support as an end-user.
The university I am employed by has recently moved from its old VPN to using GlobalProtect. While previously using a derivative of Ubuntu 20.04, I was able to successfully launch and use the GlobalProtect VPN client. I have recently upgraded to the latest Ubuntu 22.04 operating system, and I am no longer able to use the GP VPN client due to a change to the latest version of OpenSSL.
When launching the VPN client, the associated app's icon would blink on and off in my task bar, but nothing would ever happen. After implementing this workaround, I was able to launch the gui VPN client, input my gateway, launch the authentication browser, successfully authenticate, and send a push to my phone (2FA). After that, a window would open indicating the following error: SSL handshake failed
Failed to load URL [gateway address]
QtNetwork Error 6
This is a known issue and is described in this bug report. Comment #28 in the bug report indicates that the OpenSSL developers have made a deliberate decision disable unsecure renegotiation. It seems to me that a possible fix could be for the GlobalProtect VPN client to offer an option to enable unsecure renegotiation in OpenSSL. You can see this change to OpenSSL in the commit as well as in the upstream migration guide.
In order to access work-related electronic systems remotely, it's essential that the GlobalProtect VPN client is working properly for me, although as a Linux user I realize that I am in the minority unfortunately. The VPN client worked just fine prior to upgrading my OS to the latest version so it didn't occur to me that there would be any issues after upgrading. Could you please look into applying a fix so that the GlobalProtect VPN client is compatible with the current version of OpenSSL? I would be happy to serve as a test subject for you if needed. I am running OpenSSL 3.0.2 15 Mar 2022.
Thank you!
... View more