Bug#466477: bluepages.ibm.com

Simon Josefsson simon at josefsson.org
Sun Oct 12 20:19:16 UTC 2008


Simon Josefsson <simon at josefsson.org> writes:

>>> However, maybe the problem is with some extension.  Then maybe disabling
>>> that extension should be sufficient, and you don't need to disable TLS
>>> 1.0.
>>
>> Indeed, it'd be nice to drop just the problematic extension, if feasible
>
> I'm somewhat puzzled that openldap would send the OpenPGP extension
> though -- gnutls-cli does because it supports TLS-OpenPGP, but I don't
> think openldap does.  Maybe openldap doesn't.  And that instead openldap
> just sends the server_name extension support, and that is the
> problematic extension. Or the problem could be just _any_ extension.  If
> so, I don't think there is a priority string that would disable all
> extensions but still use, say, TLS 1.0.  Maybe we should look into
> adding a flag like that...

I was wrong, it doesn't work like that.  GnuTLS doesn't send the
server_name extension by default, the application needs to call
gnutls_server_name_set explicitly to enable it.  For gnutls-cli, you can
use --disable-extensions to avoid sending the server name:

gnutls-cli -p 636 bluepages.ibm.com -d 4711 --priority NORMAL:-VERS-TLS1.1 --disable-extensions

To disable both cert_type and server_name use:

gnutls-cli -d 4711 -p 443 yxa.extundo.com --priority NORMAL:-VERS-TLS1.1:-CTYPE-OPENPGP --disable-extensions

Maybe TLS 1.1 isn't the problem, if so this should work:

gnutls-cli -d 4711 -p 443 yxa.extundo.com --priority NORMAL:-CTYPE-OPENPGP --disable-extensions

I really hope one of these commands work.  I think it would mean we
understand the server's bug, and know how to work around it without
resorting to falling back to SSL 3.0.

/Simon





More information about the Pkg-gnutls-maint mailing list