On 01/06, Landry Breuil wrote:
> On Fri, Jan 06, 2017 at 05:07:54PM +0100, Landry Breuil wrote:
> > On Fri, Jan 06, 2017 at 04:55:40PM +0100, Landry Breuil wrote:
> > > On Fri, Jan 06, 2017 at 10:43:08AM -0500, Daniel Jakots wrote:
> > > > On Fri, 6 Jan 2017 11:08:56 +0100, Landry Breuil <lan...@openbsd.org>
> > > > wrote:
> > > > 
> > > > > On Fri, Jan 06, 2017 at 10:59:40AM +0100, Sol?ne Rapenne wrote:
> > > > > > Le 2017-01-06 10:47, Sol?ne Rapenne a ?crit?:  
> > > > > > > Le 2017-01-06 10:38, Landry Breuil a ?crit?:  
> > > > > > > > On Fri, Jan 06, 2017 at 10:33:04AM +0100, Sol?ne Rapenne
> > > > > > > > wrote:  
> > > > > > > > > Hello,
> > > > > > > > > 
> > > > > > > > > I upgraded my amd64 -current this morning (OpenBSD 6.0-current
> > > > > > > > > (GENERIC.MP)
> > > > > > > > > #110: Thu Jan  5 20:32:18 MST 2017)
> > > > > > > > > 
> > > > > > > > > With the latest firefox version (firefox-50.1.0) I can't
> > > > > > > > > connect to www.google.com, I get the following message
> > > > > > > > > 
> > > > > > > > > Your connection is not secure
> > > > > > > > > The website tried to negotiate an inadequate level of
> > > > > > > > > security. google.com uses security technology that is
> > > > > > > > > outdated and vulnerable to
> > > > > > > > > attack. An attacker could easily reveal information which you
> > > > > > > > > thought to be
> > > > > > > > > safe. The website administrator will need to fix the server
> > > > > > > > > first before you
> > > > > > > > > can visit the site.
> > > > > > > > > Error code: NS_ERROR_NET_INADEQUATE_SECURITY
> > > > > > > > > 
> > > > > > > > > 
> > > > > > > > > I tried a few others SSL websites and they all works.  
> > > > > > > > 
> > > > > > > > Iirc that's due to the fact that some certs were removed from
> > > > > > > > cert.pem and those were in the cert chain for google. Should be
> > > > > > > > fixed or a fix is
> > > > > > > > in the works.
> > > > > > > > 
> > > > > > > > That's the perfect occasion to start using another search
> > > > > > > > engine which respects users' privacy :)
> > > > > > > > 
> > > > > > > > Landry  
> > > > > > > 
> > > > > > > For what it worth, the problem occurs with firefox-esr too, but it
> > > > > > > doesn't
> > > > > > > show an error, it just fails silently and keep the current page
> > > > > > > viewed.  
> > > > > > 
> > > > > > thanks to johany@ on IRC, setting network.http.spdy.enabled.http2
> > > > > > to false in
> > > > > > about:config works as a workaround  
> > > > > 
> > > > > Ah. Then maybe it's a fuckup with TLS1.3 in nss 3.28. Maybe 3.28.1
> > > > > will fix this. Or not.
> > > > 
> > > > FYI, still broken with 3.28.1.
> > > 
> > > Aaah, crap, now that rings a bell. Cf
> > > https://bugzilla.mozilla.org/show_bug.cgi?id=1323209 and
> > > https://bugzilla.mozilla.org/show_bug.cgi?id=1290037. Fuck. Fuckety Fuck.
> > > 
> > > So http/2 is broken with nss > 3.28... hm. I'm not sure waiting for 51 /
> > > next esr release is the right solution, since that's planned for the 24.
> > > Guess reverting the nss update is the solution. Sigh.
> > 
> > Two options (well, three)
> > - try rebuilding nss 3.28.1 without NSS_ENABLE_TLS_1_3=1, see if that
> >   helps (i think it's unrelated but who knows..)
> > - apply https://bug1290037.bmoattachments.org/attachment.cgi?id=8778661
> >   to firefox, rebuild - should fixit
> 
> Here are the full diffs for esr and mainline. I'll commit them when
> someone confirms me this fixes the issue (cant test tonight)
> 
> Landry
> 

> Index: Makefile
> ===================================================================
> RCS file: /cvs/ports/www/firefox-esr/Makefile,v
> retrieving revision 1.44
> diff -u -r1.44 Makefile
> --- Makefile  14 Dec 2016 13:44:19 -0000      1.44
> +++ Makefile  6 Jan 2017 19:29:34 -0000
> @@ -8,6 +8,7 @@
>  MOZILLA_CODENAME =   browser
>  BROKEN-sparc64 =     xpcshell SIGBUS during fake
>  EXTRACT_SUFX =               .tar.xz
> +REVISION =   0
>  
>  PKGNAME =    ${MOZILLA_PROJECT}-esr-${MOZILLA_VERSION:S/esr//}
>  SO_VERSION = 3.0
> Index: patches/patch-netwerk_protocol_http_Http2Session_cpp
> ===================================================================
> RCS file: patches/patch-netwerk_protocol_http_Http2Session_cpp
> diff -N patches/patch-netwerk_protocol_http_Http2Session_cpp
> --- /dev/null 1 Jan 1970 00:00:00 -0000
> +++ patches/patch-netwerk_protocol_http_Http2Session_cpp      6 Jan 2017 
> 19:29:34 -0000
> @@ -0,0 +1,18 @@
> +$OpenBSD$
> +
> +Bug 1290037: Fix HTTP/2 with nss 3.28.
> +https://hg.mozilla.org/mozilla-central/rev/361ac226da2a
> +
> +--- netwerk/protocol/http/Http2Session.cpp.orig      Mon Jul 25 14:12:07 2016
> ++++ netwerk/protocol/http/Http2Session.cpp   Fri Jan  6 19:46:48 2017
> +@@ -3521,8 +3521,8 @@ Http2Session::ConfirmTLSProfile()
> +     LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to DH %d < 2048\n",
> +           this, keybits));
> +     RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
> +-  } else if (kea == ssl_kea_ecdh && keybits < 256) { // 256 bits is 
> "security level" of 128
> +-    LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 
> 256\n",
> ++  } else if (kea == ssl_kea_ecdh && keybits < 224) { // see rfc7540 9.2.1.
> ++    LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 
> 224\n",
> +           this, keybits));
> +     RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
> +   }

> Index: Makefile
> ===================================================================
> RCS file: /cvs/ports/www/mozilla-firefox/Makefile,v
> retrieving revision 1.306
> diff -u -r1.306 Makefile
> --- Makefile  14 Dec 2016 13:30:34 -0000      1.306
> +++ Makefile  6 Jan 2017 19:29:04 -0000
> @@ -10,6 +10,7 @@
>  MOZILLA_CODENAME =   browser
>  BROKEN-sparc64 =     xpcshell SIGBUS during fake
>  EXTRACT_SUFX =               .tar.xz
> +REVISION =   0
>  
>  SO_VERSION = 68.0
>  # NOTE: Must bump minor version if any shlib's are removed from the
> Index: patches/patch-netwerk_protocol_http_Http2Session_cpp
> ===================================================================
> RCS file: patches/patch-netwerk_protocol_http_Http2Session_cpp
> diff -N patches/patch-netwerk_protocol_http_Http2Session_cpp
> --- /dev/null 1 Jan 1970 00:00:00 -0000
> +++ patches/patch-netwerk_protocol_http_Http2Session_cpp      6 Jan 2017 
> 19:29:04 -0000
> @@ -0,0 +1,18 @@
> +$OpenBSD$
> +
> +Bug 1290037: Fix HTTP/2 with nss 3.28.
> +https://hg.mozilla.org/mozilla-central/rev/361ac226da2a
> +
> +--- netwerk/protocol/http/Http2Session.cpp.orig      Mon Oct 31 21:15:27 2016
> ++++ netwerk/protocol/http/Http2Session.cpp   Fri Jan  6 20:19:41 2017
> +@@ -3542,8 +3542,8 @@ Http2Session::ConfirmTLSProfile()
> +     LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to DH %d < 2048\n",
> +           this, keybits));
> +     RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
> +-  } else if (kea == ssl_kea_ecdh && keybits < 256) { // 256 bits is 
> "security level" of 128
> +-    LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 
> 256\n",
> ++  } else if (kea == ssl_kea_ecdh && keybits < 224) { // see rfc7540 9.2.1.
> ++    LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 
> 224\n",
> +           this, keybits));
> +     RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
> +   }

I will toss this on the build cycle I was about to start. The non-ESR
one at least. Should know tomorrow or late tonight. :-)

.... Ken

Reply via email to