Bug#912206: freerdp2-x11: ERRCONNECT_TLS_CONNECT_FAILED with libssl1.1 1.1.1-1
Mike Gabriel
mike.gabriel at das-netzwerkteam.de
Mon Oct 29 14:13:26 GMT 2018
Hi,
On Mo 29 Okt 2018 09:34:54 CET, Kevin Locke wrote:
> Package: freerdp2-x11
> Version: 2.0.0~git20180411.1.7a7b1802+dfsg1-2+b1
> Severity: normal
>
> Dear Maintainer,
>
> After upgrading libssl1.1 from 1.1.0h-4 to 1.1.1-1 xfreerdp is no longer
> able to connect to a computer running Remote Desktop Services on Windows
> Server 2008 R2 (with default settings as far as I am aware) using TLS
> security. Connection fails with the following messages:
>
> [ERROR][com.freerdp.core] - freerdp_set_last_error
> ERRCONNECT_TLS_CONNECT_FAILED [0x00020008]
> [ERROR][com.freerdp.core.connection] - Error: protocol security
> negotiation or connection failure
>
> Downgrading libssl1.1 to 1.1.0h-4 fixes the issue. To further diagnose
> the cause, I noticed that the server sends TCP RST in response to the
> SSL Client Hello message. After some trial and error, I determined that
> this occurs whenever rsa_pkcs1_sha1 in not the offered signature
> algorithms, which is the case for SECLEVEL=2 which is the default in the
> libssl1.1 Debian package since version 1.1.1~~pre6-1. To confirm, this
> fails:
>
> openssl s_client -connect 192.168.0.2:3389
>
> while this works:
>
> openssl s_client -cipher DEFAULT at SECLEVEL=1 -connect 192.168.0.2:3389
>
> For further confirmation that rsa_pkcs1_sha1 is responsible, this works:
>
> openssl s_client -cipher DEFAULT at SECLEVEL=1 -sigalgs
> rsa_pkcs1_sha1 -connect 192.168.0.2:3389
>
> while this fails:
>
> openssl s_client -cipher DEFAULT at SECLEVEL=1 -sigalgs
> RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:ECDSA+SHA224:DSA+SHA1:ECDSA+SHA1 -connect
> 192.168.0.2:3389
>
> Applying this discovery, it is possible to make xfreerdp work using:
>
> xfreerdp /tls-ciphers:DEFAULT at SECLEVEL=1
>
> However, since most users are unlikely to figure this out on their own,
> I'd suggest calling SSL_CTX_set_security_level to set the security level
> to 1 or improving the error message to suggest this workaround.
>
> Thanks,
> Kevin
Bernhard from FreeRDP upstream has started working on this and we will
likely provide patches next week.
So, please stay tuned + thanks for reporting this. The problem is
caused by system-wide openssl default settings that have changed
between those two referenced openssl versions. We will try to pin
things down in FreeRDP, so that system-wide defaults don't apply
anymore for FreeRDP.
Mike
--
DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
mobile: +49 (1520) 1976 148
landline: +49 (4354) 8390 139
GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31
mail: mike.gabriel at das-netzwerkteam.de, http://das-netzwerkteam.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: Digitale PGP-Signatur
URL: <http://alioth-lists.debian.net/pipermail/pkg-remote-team/attachments/20181029/b3c99735/attachment.sig>
More information about the pkg-remote-team
mailing list