Bug#857436: libgnutls-openssl27: OpenSSL wrapper not exposing TLS 1.1/1.2 ciphers

2017-03-10 Thread Justin Coffman
Package: libgnutls-openssl27
Version: 3.5.10-1
Severity: important

Certain packages that rely on this OpenSSL wrapper library are unable to 
connect using TLS 1.1/1.2 cipher suites.

Even though the server (and the client, when compiled against OpenSSL) supports 
the full array of TLS 1.1/1.2 ciphers, the package as provided seems to be 
limited to only TLS 1.0 ciphers.

An example is bug #842120 in package tf5.

tf5, when connecting using a version compiled manually against OpenSSL:

% Connected to server using cipher ECDHE-RSA-AES128-GCM-SHA256.

When connecting using the packaged version utilizing the OpenSSL wrapper:

% Connected to server using cipher RSA_AES_128_CBC_SHA1.

Given the progression toward the deprecation of TLS 1.0 (see NIST SP 800-52 
Rev. 1), it would seem prudent to ensure that packages not written against 
GnuTLS are still capable of their full function.

-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libgnutls-openssl27 depends on:
ii  libc62.24-9
ii  libgnutls30  3.5.10-1

libgnutls-openssl27 recommends no packages.

libgnutls-openssl27 suggests no packages.

-- no debconf information



Bug#842120: tf5: TLSv1.1/1.2 cipher suites not functioning

2016-10-25 Thread Justin Coffman
>> Justin Coffman  writes:
>>
>> Package: tf5
>> Version: 5.0beta8-5+b1
>> Severity: important
>>
>> TinyFugue, when compiled from upstream source against OpenSSL, is 
>> capable of the full set of expected ciphersuites (up to and including 
>> TLSv1.2), such as those utilizing AES-GCM and EC Diffie-Hellman. The 
>> version packaged in Debian, compiled against GnuTLS, is only capable 
>> of
>> SSLv3/TLSv1 negotiation, and only then with servers that do not 
>> require (EC)DH negotiation. This could render the client unusable for 
>> servers that enforce more modern security policies.
>>
>> TinyFugue when compiled against OpenSSL:
>> % Connected to (unnamed1) using cipher ECDHE-RSA-AES128-GCM-SHA256.
>>
>> TinyFugue when compiled against GnuTLS, same site:
>> % Connected to (unnamed1) using cipher RSA_AES_128_CBC_SHA1.

> Unfortunately, it can't be compiled against OpenSSL and included in Debian 
> since the licenses conflict.  (Which is why it's built against
> GnuTLS.)  It's GPL without any license exception, so such a package would be 
> rejected by Debian ftpmaster.
>
> Sadly, upstream was contacted about this in the past and doesn't feel the 
> problem warrants the effort required to correct this, so there's basically no 
> chance that an OpenSSL build will be possible in Debian.
>
> Presumably there's some way to make GnuTLS negotiate the correct ciphers, but 
> unfortunately I don't know what it is off-hand, and probably won't have time 
> in the near future to do the necessary research.  Patches welcome!
>
> -- 
> Russ Allbery (r...@debian.org)   <http://www.eyrie.org/~eagle/>>

I tried my hand at generating a patch, but the patched version didn't exhibit 
behavior any different than current. I guess my GnuTLS-fu is not strong enough.

The gotcha (I think) is in the way GnuTLS shims the SSLv23_client_method in its 
OpenSSL compatibility layer. The only other available shim is 
TLSv1_client_method, which seems to behave exactly the same way as it does 
currently.



Bug#842120: tf5: TLSv1.1/1.2 cipher suites not functioning

2016-10-25 Thread Justin Coffman
Package: tf5
Version: 5.0beta8-5+b1
Severity: important

TinyFugue, when compiled from upstream source against OpenSSL, is capable of 
the full set of expected 
ciphersuites (up to and including TLSv1.2), such as those utilizing AES-GCM and 
EC Diffie-Hellman. The 
version packaged in Debian, compiled against GnuTLS, is only capable of 
SSLv3/TLSv1 negotiation, and only 
then with servers that do not require (EC)DH negotiation. This could render the 
client unusable for servers 
that enforce more modern security policies.

TinyFugue when compiled against OpenSSL:
% Connected to (unnamed1) using cipher ECDHE-RSA-AES128-GCM-SHA256.

TinyFugue when compiled against GnuTLS, same site:
% Connected to (unnamed1) using cipher RSA_AES_128_CBC_SHA1.

-- System Information:
Debian Release: 8.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages tf5 depends on:
ii  libc62.19-18+deb8u6
ii  libgnutls-openssl27  3.3.8-6+deb8u3
ii  libpcre3 2:8.35-3.3+deb8u4
ii  libtinfo55.9+20140913-1+b1
ii  zlib1g   1:1.2.8.dfsg-2+b1

tf5 recommends no packages.

Versions of packages tf5 suggests:
pn  spell  

-- no debconf information



Bug#796752: IPv6 Nameservers

2015-08-25 Thread Justin Coffman
I've done a little bit more testing on this.

Removing IPv6 nameservers from /etc/resolv.conf does seem to resolve this
issue on my test system. I must have goofed the initial testing on that.


Bug#796752: libsres: could not bind to random port above [port]

2015-08-23 Thread Justin Coffman
Package: irssi
Version: 0.8.17-1
Severity: normal
Tags: ipv6

Dear Maintainer,

Starting irssi causes approximately ten lines of

20150823::16:55:28 libsres: could not bind to random port above 44300

to be displayed per server on initial connection. Port number is randomized for 
each message. 

Connection to servers do succeed, after which no further issue has been noted.

Seems to only occur on systems with a global IPv6 address.

The following do not affect/resolve the issue:

* Enabling/disabling IPv6 nameservers in /etc/resolv.conf
* Enabling/disabling irssi's "resolve_prefer_ipv6" setting.
* Enabling/disabling local firewall (iptables)

-- System Information:
Debian Release: 8.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages irssi depends on:
ii  libc6   2.19-18
ii  libglib2.0-02.42.1-1
ii  libncurses5 5.9+20140913-1+b1
ii  libperl5.20 5.20.2-3+deb8u1
ii  libssl1.0.0 1.0.1k-3+deb8u1
ii  libtinfo5   5.9+20140913-1+b1
ii  libval142.0-1.1
ii  perl5.20.2-3+deb8u1
ii  perl-base [perlapi-5.20.1]  5.20.2-3+deb8u1

irssi recommends no packages.

Versions of packages irssi suggests:
pn  irssi-scripts  

-- no debconf information