On 14/01/21 14:50 +0100, Theo Buehler wrote:
> On Thu, Jan 14, 2021 at 02:37:20PM +0100, Robert Nagy wrote:
> > On 14/01/21 14:27 +0100, Robert Nagy wrote:
> > > On 14/01/21 14:20 +0100, Theo Buehler wrote:
> > > > On Thu, Jan 14, 2021 at 01:32:41PM +0100, Matthieu Herrb wrote:
> > > > > Hi,
> > > > > 
> > > > > I'm trying to debug strange beahaviour changes with certificates on a
> > > > > systemc after upgrading it from 6.7 to 6.8...
> > > > > 
> > > > > On 6.7, If I run :
> > > > > 
> > > > > openssl s_server -cert mycert.pem -key mykey.pem -CAfile CA.pem
> > > > > 
> > > > > then openssl s_client -showcerts -connect localhost:4433
> > > > > 
> > > > > returns the full certificate chain mycert->CA
> > > > > 
> > > > > With the same commands on 6.8, I don't get the CA certificate.
> > > > > 
> > > > > Is this a known issue, and how can I get the chain with 6.8 ?
> > > > > 
> > > > > (my real application is sendmail...)
> > > > 
> > > > In short: Yes, this is known. You can't get the chain in 6.8.
> > > > 
> > > > This is the reason why ajacoutot switched sendmail to link against
> > > > eopenssl11 as a workaround in -stable. As your thread on ports shows,
> > > > this workaround doesn't work if you add something that links against
> > > > LibreSSL to the mix.
> > > > 
> > > > There are several layers of unexpected things/bugs involved. The two
> > > > main points are:
> > > > 
> > > > 1. The TLSv1.3 server in 6.8 does not do auto chain since we hoped to
> > > >    be able to avoid it. This was addressed post release when people
> > > >    using OpenLDAP ran into it.
> > > >    https://cvsweb.openbsd.org/src/lib/libssl/tls13_server.c#rev1.62
> > > > 
> > > > 2. The new verifier doesn't behave as it should when auto chain is
> > > >    enabled. As a workaround -current switches to the legacy verifier in
> > > >    this situation for about a week now. The proper fix in the new
> > > >    verifier is under discussion.
> > > >    https://cvsweb.openbsd.org/src/lib/libssl/tls13_server.c#rev1.65
> > > > 
> > > > I don't know whether/when there will be backports of some fixes to 6.8.
> > > > As sthen said in the thread on ports, right now the simplest fix is to
> > > > run -current.
> > > > 
> > > 
> > > i think this should be an errata for 6.8
> 
> Not exactly sure what you mean by "this," but I emphatically agree,
> errata are long overdue.  It would be desirable to avoid an outright
> switch back to the legacy verifier if that's what you mean by the below.
> 
> > I am also getting this problem with bacula using TLS < 1.3, reported to Bob
> > already, and I am currently running with the legacy verifier.
> 
> FWIW this is a different issue that was also adressed in -current.
> https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libcrypto/x509/x509_verify.c#rev1.26

Well we either do a big errata consisting of all these fixes or switch back
to the legacy one in 6.8 with one small errata. People rely on stable, so we
should act accordingly. 

Reply via email to