** Changed in: firefox (Ubuntu Bionic) Assignee: (unassigned) => Olivier Tilloy (osomon)
-- You received this bug notification because you are a member of Desktop Packages, which is subscribed to firefox in Ubuntu. https://bugs.launchpad.net/bugs/1834671 Title: TLSv1.3 client certificate authentication with renegotiation unsupported in browsers Status in apache2 package in Ubuntu: Invalid Status in chromium package in Ubuntu: New Status in firefox package in Ubuntu: New Status in apache2 source package in Bionic: Invalid Status in chromium source package in Bionic: New Status in firefox source package in Bionic: New Status in apache2 source package in Disco: Invalid Status in chromium source package in Disco: New Status in firefox source package in Disco: New Status in apache2 source package in Eoan: Invalid Status in chromium source package in Eoan: New Status in firefox source package in Eoan: New Bug description: This is mostly a place holder bug, as more information becomes available. What is known so far is that a certain configuration of client certificate authentication using TLSv1.3 is not working with most (all at this point?) browsers, resulting in the server returning this error message: Forbidden You don't have permission to access / on this server. Reason: Cannot perform Post-Handshake Authentication. Apache/2.4.38 (Ubuntu) Server at disco-apache-client-cert.lxd Port 443 It also logs it to error.log: [Fri Jun 28 16:59:24.596425 2019] [ssl:error] [pid 1391:tid 139642783385344] [client 10.0.100.1:41452] AH10129: verify client post handshake [Fri Jun 28 16:59:24.596493 2019] [ssl:error] [pid 1391:tid 139642783385344] [client 10.0.100.1:41452] AH10158: cannot perform post-handshake authentication [Fri Jun 28 16:59:24.596513 2019] [ssl:error] [pid 1391:tid 139642783385344] SSL Library Error: error:14268117:SSL routines:SSL_verify_client_post_handshake:extension not received These are upstream bugs about it: Firefox: https://bugzilla.mozilla.org/show_bug.cgi?id=1511989 Chromium: https://bugs.chromium.org/p/chromium/issues/detail?id=911653 Apache2 (invalid): https://bz.apache.org/bugzilla/show_bug.cgi?id=62975 One server workaround is to disable TLSv1.3. Something like this: SSLProtocol all -SSLv3 -TLSv1.3 ("-TLSv1.3" is what was added to that default config) Sample server config to show the problem (minus the SSL certificate parameters): <Location /> SSLVerifyClient require Require ssl-verify-client </Location> Another workaround is to move the SSLVerifyClient config to the vhost level. It it applied to the whole vhost, and there are no exceptions in specific blocks, then a re-negotiation isn't triggered and the problem doesn't happen. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1834671/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp