Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2016-03-13 Thread Sebastian Andrzej Siewior
As of 1.0.2g-1 I can connect to both sites mentionied in this bug report.
Further SSLv2 and SSLv3 is removed from openssl. Therefore I see no problem
here I think that this bug could be closed.

Sebastian



Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2014-01-22 Thread Juan Ezquerro LLanes
Package: libssl1.0.0
Version: 1.0.1f-1
Followup-For: Bug #683159

Dear Maintainer,
*** Please consider answering these questions, where appropriate ***

   * What led up to the situation?

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

   * What was the outcome of this action?

   * What outcome did you expect instead?

*** End of the template - remove these lines ***


-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.10-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libssl1.0.0 depends on:
ii  debconf [debconf-2.0]  1.5.52
ii  libc6  2.17-97
ii  multiarch-support  2.17-97

libssl1.0.0 recommends no packages.

libssl1.0.0 suggests no packages.

-- debconf information:
  libssl1.0.0/restart-failed:
  libssl1.0.0/restart-services:


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2012-07-29 Thread Olivier Bonvalet
Package: openssl
Version: 1.0.1c-3
Severity: important

--- Please enter the report below this line. ---

I can't connect to hosts which allow only SSLv3 :

$ openssl s_client -connect www.ovh.com:443
CONNECTED(0003)
139991546484392:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake 
failure:s23_lib.c:177:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 320 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
---


but by specifiying ssl3 on command line, it works :

$ openssl s_client -connect www.ovh.com:443 -ssl3
CONNECTED(0003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = 
AddTrust External CA Root
verify error:num=19:self signed certificate in certificate chain
verify return:0
---
Certificate chain
 0 
s:/serialNumber=424761419/1.3.6.1.4.1.311.60.2.1.3=FR/1.3.6.1.4.1.311.60.2.1.2=Nord/1.3.6.1.4.1.311.60.2.1.1=ROUBAIX/businessCategory=Private
 Organization/C=FR/postalCode=59100/ST=NORD/L=ROUBAIX/street=2 rue 
Kellermann/O=OVH/OU=0002 424761419/OU=Comodo EV SSL/CN=www.ovh.com
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO 
Extended Validation Secure Server CA
 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO 
Extended Validation Secure Server CA
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO 
Certification Authority
 2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO 
Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External 
CA Root
 3 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External 
CA Root
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External 
CA Root
---
[...]
---
SSL handshake has read 5379 bytes and written 491 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : SSLv3
Cipher: AES256-SHA
Session-ID: 8635E8662D8A62507C15E8371C4E8121F317A17F15D749FE40112EA5FC022455
Session-ID-ctx:
Master-Key: 
D5035A130786444B3B08C7E522EA0805B80B461803F32554B1ABF98B9172ECBE98E9252C4A6840F8500C9913CAE85281
Key-Arg   : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1343556050
Timeout   : 7200 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---




Note that *gnutls* is also affected, but browsers like Lynx, Iceweasel, 
Chromium or Empathy doesn't have any trouble.




--- System information. ---
Architecture: amd64
Kernel: Linux 3.2.0-3-amd64

Debian Release: wheezy/sid
500 unstable apt.daevel.fr
1 experimental apt.daevel.fr

--- Package information. ---
Depends (Version) | Installed
-+-=
libc6 (= 2.7) | 2.13-35
libssl1.0.0 (= 1.0.1) | 1.0.1c-3
zlib1g (= 1:1.1.4) | 1:1.2.7.dfsg-13


Package's Recommends field is empty.

Suggests (Version) | Installed
==-+-===
ca-certificates | 20120623


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683159: [Pkg-openssl-devel] Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2012-07-29 Thread Kurt Roeckx
On Sun, Jul 29, 2012 at 12:02:41PM +0200, Olivier Bonvalet wrote:
 Package: openssl
 Version: 1.0.1c-3
 Severity: important
 
 --- Please enter the report below this line. ---
 
 I can't connect to hosts which allow only SSLv3 :
 
 $ openssl s_client -connect www.ovh.com:443

This also works:
openssl s_client -no_tls1_1 -connect www.ovh.com:443
[...]
Protocol  : TLSv1

 Note that *gnutls* is also affected, but browsers like Lynx, Iceweasel, 
 Chromium or Empathy doesn't have any trouble.

Yes, the site you're talking to is broken.  Nothing we can do
about that other than disable TLS  1.1, or retry with it
disabled.


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683159: [Pkg-openssl-devel] Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2012-07-29 Thread Olivier Bonvalet
On 29/07/2012 12:27, Kurt Roeckx wrote:
 On Sun, Jul 29, 2012 at 12:02:41PM +0200, Olivier Bonvalet wrote:
 Package: openssl
 Version: 1.0.1c-3
 Severity: important

 --- Please enter the report below this line. ---

 I can't connect to hosts which allow only SSLv3 :

 $ openssl s_client -connect www.ovh.com:443
 This also works:
 openssl s_client -no_tls1_1 -connect www.ovh.com:443
 [...]
 Protocol  : TLSv1

 Note that *gnutls* is also affected, but browsers like Lynx, Iceweasel, 
 Chromium or Empathy doesn't have any trouble.
 Yes, the site you're talking to is broken.  Nothing we can do
 about that other than disable TLS  1.1, or retry with it
 disabled.


 Kurt



Thanks for the clarification Kurt. Just a question : why is it working from 
Debian Squeeze ? Is it because in Debian Squeeze TLS  1.1 is not compatible ?

Olivier


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683159: [Pkg-openssl-devel] Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2012-07-29 Thread Kurt Roeckx
On Sun, Jul 29, 2012 at 01:58:09PM +0200, Olivier Bonvalet wrote:
 On 29/07/2012 12:27, Kurt Roeckx wrote:
  On Sun, Jul 29, 2012 at 12:02:41PM +0200, Olivier Bonvalet wrote:
  Package: openssl
  Version: 1.0.1c-3
  Severity: important
 
  --- Please enter the report below this line. ---
 
  I can't connect to hosts which allow only SSLv3 :
 
  $ openssl s_client -connect www.ovh.com:443
  This also works:
  openssl s_client -no_tls1_1 -connect www.ovh.com:443
  [...]
  Protocol  : TLSv1
 
  Note that *gnutls* is also affected, but browsers like Lynx, Iceweasel, 
  Chromium or Empathy doesn't have any trouble.
  Yes, the site you're talking to is broken.  Nothing we can do
  about that other than disable TLS  1.1, or retry with it
  disabled.
 
 
  Kurt
 
 
 
 Thanks for the clarification Kurt. Just a question : why is it working from 
 Debian Squeeze ? Is it because in Debian Squeeze TLS  1.1 is not compatible ?

openssl only support TLS 1.1 since version 1.0.1, and squeeze has
a 0.9.8 version.


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683159: [Pkg-openssl-devel] Bug#683159: [openssl] can't connect to hosts which allow only SSLv3

2012-07-29 Thread Olivier Bonvalet
Ok, thanks again Kurt.

Sorry for the noise.

Olivier


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org