On 14/01/21 14:50 +0100, Theo Buehler wrote: > On Thu, Jan 14, 2021 at 02:37:20PM +0100, Robert Nagy wrote: > > On 14/01/21 14:27 +0100, Robert Nagy wrote: > > > On 14/01/21 14:20 +0100, Theo Buehler wrote: > > > > On Thu, Jan 14, 2021 at 01:32:41PM +0100, Matthieu Herrb wrote: > > > > > Hi, > > > > > > > > > > I'm trying to debug strange beahaviour changes with certificates on a > > > > > systemc after upgrading it from 6.7 to 6.8... > > > > > > > > > > On 6.7, If I run : > > > > > > > > > > openssl s_server -cert mycert.pem -key mykey.pem -CAfile CA.pem > > > > > > > > > > then openssl s_client -showcerts -connect localhost:4433 > > > > > > > > > > returns the full certificate chain mycert->CA > > > > > > > > > > With the same commands on 6.8, I don't get the CA certificate. > > > > > > > > > > Is this a known issue, and how can I get the chain with 6.8 ? > > > > > > > > > > (my real application is sendmail...) > > > > > > > > In short: Yes, this is known. You can't get the chain in 6.8. > > > > > > > > This is the reason why ajacoutot switched sendmail to link against > > > > eopenssl11 as a workaround in -stable. As your thread on ports shows, > > > > this workaround doesn't work if you add something that links against > > > > LibreSSL to the mix. > > > > > > > > There are several layers of unexpected things/bugs involved. The two > > > > main points are: > > > > > > > > 1. The TLSv1.3 server in 6.8 does not do auto chain since we hoped to > > > > be able to avoid it. This was addressed post release when people > > > > using OpenLDAP ran into it. > > > > https://cvsweb.openbsd.org/src/lib/libssl/tls13_server.c#rev1.62 > > > > > > > > 2. The new verifier doesn't behave as it should when auto chain is > > > > enabled. As a workaround -current switches to the legacy verifier in > > > > this situation for about a week now. The proper fix in the new > > > > verifier is under discussion. > > > > https://cvsweb.openbsd.org/src/lib/libssl/tls13_server.c#rev1.65 > > > > > > > > I don't know whether/when there will be backports of some fixes to 6.8. > > > > As sthen said in the thread on ports, right now the simplest fix is to > > > > run -current. > > > > > > > > > > i think this should be an errata for 6.8 > > Not exactly sure what you mean by "this," but I emphatically agree, > errata are long overdue. It would be desirable to avoid an outright > switch back to the legacy verifier if that's what you mean by the below. > > > I am also getting this problem with bacula using TLS < 1.3, reported to Bob > > already, and I am currently running with the legacy verifier. > > FWIW this is a different issue that was also adressed in -current. > https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libcrypto/x509/x509_verify.c#rev1.26
Well we either do a big errata consisting of all these fixes or switch back to the legacy one in 6.8 with one small errata. People rely on stable, so we should act accordingly.