On Mon, Oct 21, 2013 at 11:17:25PM +0200, li...@rhsoft.net wrote:

> > Instead of improving the world by finally supporting EC, they've
> > made things worse!  Previously clients negotiated something other
> > than EECDH key exchange, now they negotiate it and fail!  Sorry to
> > say so, but the RedHat engineers need adult supervision.
> 
> since you sound very knowledgeable about SSL may you consider
> to make a comment there?
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1019251

I have enough fish to fry.  The problem is obvious, client promises
EECDH support, server sends a standard curve name and the client
promptly fails because its list of supported curves is incomplete.

Of course you should capture a session with wireshark and see what
curve the server sends back to confirm this obvious interpretation.

> fine:     http://koji.fedoraproject.org/koji/buildinfo?buildID=471397
> crippled: http://koji.fedoraproject.org/koji/buildinfo?buildID=471781
> 
> with the first build no single error

I think you know what to do...

> > What site was your SMTP client connecting to?  IIRC Suite B supports
> > prime256v1 (aka secp256r1) and secp384r1.  Perhaps the SMTP server
> > decided to live on the bleeding edge with "secp521r1"
> 
> as far as i can see in all 8 cases currently to GMX
> 
> Oct 21 22:29:22 mail postfix/smtp[12289]: SSL_connect error to
>   mx00.gmx.net[213.165.67.99]:25: -1
> Oct 21 22:29:22 mail postfix/smtp[12289]: warning: TLS library problem: 
> 12289:error:100AE081:elliptic curve
> routines:EC_GROUP_new_by_curve_name:unknown group:ec_curve.c:316:
> Oct 21 22:29:22 mail postfix/smtp[12289]: warning: TLS library problem: 
> 12289:error:1408D010:SSL
> routines:SSL3_GET_KEY_EXCHANGE:EC lib:s3_clnt.c:1641:
> Oct 21 22:29:22 mail postfix/smtp[12289]: 3d3Tvy5Cdsz23: Cannot start TLS: 
> handshake failure
> 

When I test connections to this host,  I always get "AES256-SHA",
and no EDH or kEECDH ciphers are accepted.  Did gmx.de change their
configuration to work around this?  Can you build posttls-finger (from 2.11)
and test with:

    $ posttls-finger -t30 -T 180 -p TLSv1.2 -Ldebug \
        -o tls_medium_cipherlist='kEECDH:kEDH:kRSA' \
        "[213.165.67.99]"

do you get handshake failures?

-- 
        Viktor.

Reply via email to