Bug#466477: bluepages.ibm.com
Simon Josefsson
simon at josefsson.org
Sun Oct 12 20:08:16 UTC 2008
Richard A Nelson <cowboy at debian.org> writes:
>> Maybe it doesn't like TLS 1.1 _and_ doesn't like record padding. later:
>> Reading your logs suggests this will not work, record padding is only
>> effective after handshake is complete.
>>
>> Btw, could you also try this command:
>>
>> gnutls-cli -p 636 bluepages.ibm.com -d 4711 --priority NORMAL:%COMPAT:-VERS-TLS1.1:-VERS-TLS1.0
>
> This one works (and more than once) ;)
Great. Maybe %COMPAT isn't even needed, could you try:
gnutls-cli -p 636 bluepages.ibm.com -d 4711 --priority NORMAL:-VERS-TLS1.1:-VERS-TLS1.0
No need to post logs if that works. You may need to transfer some
application data to trigger the record padding problem though, so you
might not see failures with gnutls-cli if you remove %COMPAT.
>> This suggest there is a pretty fundamental problem, the server
>> disconnects after seeing client hello. Maybe the CERT_TYPE or the
>> SERVER_NAME extension triggers the bug.
>
> That has been my estimation of the failure
It is possible to disable the CERT_TYPE extension by using a priority of
-CTYPE-OPENPGP. So would this work:
gnutls-cli -p 636 bluepages.ibm.com -d 4711 --priority NORMAL:-VERS-TLS1.1:-CTYPE-OPENPGP
If so, maybe you could try to enable TLS 1.1 as well:
gnutls-cli -p 636 bluepages.ibm.com -d 4711 --priority NORMAL:-CTYPE-OPENPGP
If that works, I think we have finally identified that the server does
not cope well with the cert_type extension.
>> NORMAL:%COMPAT:-VERS-TLS1.1:-VERS-TLS1.0
>
> I'll give that a shot on a test machine
Please do, it might save you some re-compiles...
>> However, maybe the problem is with some extension. Then maybe disabling
>> that extension should be sufficient, and you don't need to disable TLS
>> 1.0.
>
> Indeed, it'd be nice to drop just the problematic extension, if feasible
I'm somewhat puzzled that openldap would send the OpenPGP extension
though -- gnutls-cli does because it supports TLS-OpenPGP, but I don't
think openldap does. Maybe openldap doesn't. And that instead openldap
just sends the server_name extension support, and that is the
problematic extension. Or the problem could be just _any_ extension. If
so, I don't think there is a priority string that would disable all
extensions but still use, say, TLS 1.0. Maybe we should look into
adding a flag like that...
/Simon
More information about the Pkg-gnutls-maint
mailing list