[Pkg-openssl-devel] Bug#918717: Bug#918717: Bug#918717: openssl: wrong signature type on a specific website with openssl.cnf shipped in debian

Kurt Roeckx kurt at roeckx.be
Tue Jan 8 19:30:36 GMT 2019


On Tue, Jan 08, 2019 at 07:30:01PM +0100, Sebastian Andrzej Siewior wrote:
> On 2019-01-08 17:40:04 [+0100], Jérémy Lal wrote:
> > Package: openssl
> > Version: 1.1.1a-1
> > Severity: normal
> > 
> > Hi,
> > 
> > curl https://portal.gexpertise.fr/GexPortal
> > returns an error,
> > 
> > however (you need nodejs 10.15~dfsg-8 for this file to be available - the file in itself
> > is there to be able to run upstream tests suites)
> > OPENSSL_CONF=/usr/include/nodejs/openssl.cnf curl https://portal.gexpertise.fr/GexPortal
> > does work
> 
> The server is vurnable to OpenSSL Padding Oracle vulnerability
> (CVE-2016-2107) [0].
> 
> The problem is that the remote server is signing the certificate wit
> SHA1 instead something stronger:
> |No client certificate CA names sent
> |Peer signing digest: SHA1
> |Peer signature type: RSA
> |Server Temp Key: ECDH, P-256, 256 bits
> 
> Kurt did we want to enable SHA1 for DEFAULT at SECLEVEL=2?

No, we do not want to enable it at level 2.

The server in question should support SHA256, but because of a bug
always uses SHA1. The commit that fixed it in the 1.0.1 branch,
which I think is what they are running, is
4e05aedbcab7f7f83a887e952ebdcc5d4f2291e4, which is a commit from
2014.


Kurt



More information about the Pkg-openssl-devel mailing list