Received: from out2.migadu.com (out2.migadu.com [188.165.223.204]) by nld3-dev1.alpinelinux.org (Postfix) with ESMTPS id D9A68781136 for <~alpine/devel@lists.alpinelinux.org>; Tue, 9 Aug 2022 14:39:30 +0000 (UTC) MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ayaya.dev; s=key1; t=1660055970; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tXLygQYlSOsXW61E8pRi3h5dyZ6q/fpfDqCzRwU8uVs=; b=SXYbo0WdTl01L+UsUb9H/0NyipkvAGwV9oBqH6i/y/HgYoz8gcjIdR2/G/HpLeGSMfPCNq Z9tmHOYKawWMbknF2Gw1i+FZh4g+a4nJmifBc7DuHHxsUhmihLqsrkOJLBPvkMSAllY2vR y6Dftu7MySDmiyo1toNzk/5VAkFGwgA= Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Tue, 09 Aug 2022 16:39:29 +0200 Message-Id: X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: "alice" To: "Nico Schottelius" Cc: "Natanael Copa" , <~alpine/devel@lists.alpinelinux.org> Subject: Re: OpenSSL 3 pushed to git master References: <20220803105631.77d1cc2c@ncopa-desktop.lan> <87iln2cxo3.fsf@ungleich.ch> <87lerx7r2v.fsf@ungleich.ch> <87k07h5wx1.fsf@ungleich.ch> In-Reply-To: <87k07h5wx1.fsf@ungleich.ch> X-Migadu-Flow: FLOW_OUT X-Migadu-Auth-User: ayaya.dev On Tue Aug 9, 2022 at 11:22 AM CEST, Nico Schottelius wrote: > > Hey Alice, > > "alice" writes: > > > On Tue Aug 9, 2022 at 10:25 AM CEST, Nico Schottelius wrote: > >> I am using openconnect to connect to "highly secure" networks > >> that. Highly secure means: corporate managed, specific access and > >> traffic policies, 2FA. It however does not mean: up-to-date software o= r > >> Open Source Software. It's rather the opposite: these are proprietary, > >> closed source systems with upgrade cycles of "only if need be", usuall= y > >> done if there is a CVE out there. > > certainly, i'm aware of the general background, and guessed as much :) = i > > just don't think it's a good idea for other people to be affected by > > such things, and to keep 'openssl downgraded' or 'insecure defaults > > enabled' just because someone is connecting to some corporate service > > (which doesn't pay us for support) > > You have a very good point here, if it only affects one user, then it's > not worth handling it. However, if there is not more coming up, it might > be sensible not to break a lot of users. In regards to the > openssl.cnf workaround, it seems not to work for me: you got me there; i actually only tested curl. my mistake. > > Using > > -------------------------------------------------------------------------= ------- > [openssl_init] > # providers =3D provider_sect # commented out > > # added > ssl_conf =3D ssl_sect > > # added > [ssl_sect] > system_default =3D system_default_sect > > # added > [system_default_sect] > Options =3D UnsafeLegacyRenegotiation > > # List of providers to load > [provider_sect] > default =3D default_sect > > -------------------------------------------------------------------------= ------- > > Running openconnect gives the same error: > > -------------------------------------------------------------------------= ------- > 90F96C15467F0000:error:0A000152:SSL routines:final_renegotiate:unsafe leg= acy renegotiation disabled:ssl/statem/extensions.c:879: > -------------------------------------------------------------------------= ------- > > Which makes sense, given that running openconnect does not load that > openssl configuration file: > > -------------------------------------------------------------------------= ------- > strace -f -e open -o opentrace openconnect --protocol=3Dgp .... > > nb3:~# grep /etc opentrace > 12508 open("/etc/ld-musl-x86_64.path", O_RDONLY|O_LARGEFILE|O_CLOEXEC) = =3D -1 ENOENT (No such file or directory) > 12508 open("/etc/hosts", O_RDONLY|O_LARGEFILE|O_CLOEXEC) =3D 6 > 12508 open("/etc/resolv.conf", O_RDONLY|O_LARGEFILE|O_CLOEXEC) =3D 6 > 12508 open("/etc/ssl/cert.pem", O_RDONLY|O_LARGEFILE) =3D 7 > nb3:~# grep -c openssl.cnf opentrace > 0 > > -------------------------------------------------------------------------= ------- > > I verified three times that the content is correct - is it possible that > not every app linked against openssl actually loads the configuration > file? seems some don't. i was naive.. however: `openconnect --allow-insecure-crypto` seems to work for me (no more insecure renegotiation message). > > Best regards, > > Nico > > -- > Sustainable and modern Infrastructures by ungleich.ch