Sebastien,

I believe that something on the Yahoo/AOL/etc server side was changed to return 
a zero length session ticket for older TLS protocols.  According to 
https://gnutls.org/manual/html_node/Session-tickets.html:
"A disadvantage of session tickets is that they eliminate the effects of 
forward secrecy when a server uses the same key for long time. That is, the 
secrecy of all sessions on a server using tickets depends on the ticket key 
being kept secret. For that reason server keys should be rotated and discarded 
regularly. [snip] Under TLS 1.3 session tickets are mandatory for session 
resumption, and they do not share the forward secrecy concerns as with TLS 1.2 
or earlier."

My guess is that they felt this was insecure and return a zero length
session ticket as a workaround.  If more servers are configured that way
this will become a bigger problem including more programs than just
Evolution and Claws email clients.

RFC5077 states "If the server determines that it does not want to include a 
ticket after it has included the SessionTicket extension in the ServerHello, 
then it sends a zero-length ticket in the NewSessionTicket handshake message."  
A zero length ticket is a legitimate value and should be supported.  Testing 
with the current version of OpenSSL on Ubuntu 18.04.4 
(1.1.1-1ubuntu2.1~18.04.5) showed that it is able to handle zero length session 
tickets and wireshark confirmed that the server returned a zero length ticket 
with the following command:
$ openssl s_client -msg -tls1_2 -connect pop.verizon.net:995

This is the first time I have gone through this process.  Please let me know if 
I missed something or did something wrong.  I'm trying to follow the SRU wiki 
entry:
https://wiki.ubuntu.com/StableReleaseUpdates

If I'm reading this correctly this bug falls under the last bullet of
section "2.1 High-impact bugs" which states "Updates that need to be
applied to Ubuntu packages to adjust to changes in the environment,
server protocols, web services, and similar, i. e. where the current
version just ceases to work."

I believe the following two conditions have been met:
3.1 Check that the bug is fixed in the current development release, and that 
its bug task is "Fix Released"
3.2 Ensure that the bug report for this issue is public

I'm working on 3.3 and modified the description with the first cut at an
impact statement.  I'm not sure what to put for the [Regression
Potential] section.  Any help that you can provide will be greatly
appreciated!

Thanks,

Rod


** Description changed:

+ [Impact]
+ 
+ Evolution and Claws email clients stopped connecting to Yahoo, AOL,
+ Verizon, AT&T, Bell South, etc email servers which are run by the same
+ group.  Users are unable to get to their email.
+ 
+ Nominating for SRU, fulfills: "Updates that need to be applied to Ubuntu
+ packages to adjust to changes in the environment, server protocols, web
+ services, and similar, i. e. where the current version just ceases to
+ work."
+ 
  [testcase]
  
  $ gnutls-cli --priority=NORMAL:-VERS-TLS1.3 pop.verizon.net:995
  [...]
  - Status: The certificate is trusted.
  *** Fatal error: Internal error in memory allocation.
- 
  
  When Evolution checks my verizon.net account it displays the message
  "Error performing TLS handshake: Internal error in memory allocation"
  and doesn't download any new email messages.  This started happening two
  days ago shortly after updates were applied.  Normally it would download
  the new email messages.  Searching the web I found a Linux Mint forum
  with users having the same issue.  Some users felt it maybe an expired
  certificate while others thought it might be related to the recent
  update.  What can I do to get more information about this issue?
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: evolution 3.28.5-0ubuntu0.18.04.2
  ProcVersionSignature: Ubuntu 5.3.0-51.44~18.04.2-generic 5.3.18
  Uname: Linux 5.3.0-51-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.14
  Architecture: amd64
  CurrentDesktop: ubuntu:GNOME
  Date: Fri May  1 07:03:51 2020
  InstallationDate: Installed on 2017-12-12 (870 days ago)
  InstallationMedia: Ubuntu 16.04.3 LTS "Xenial Xerus" - Release amd64 
(20170801)
  ProcEnviron:
   PATH=(custom, no username)
   XDG_RUNTIME_DIR=<set>
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: evolution
  UpgradeStatus: Upgraded to bionic on 2018-12-28 (489 days ago)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876286

Title:
  Evolution reports "Error performing TLS handshake: Internal error in
  memory allocation."

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1876286/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to