[Python-apps-team] Bug#918475:

Doug Freed dwfreed at mtu.edu
Sun May 5 23:28:09 BST 2019


I spent some time debugging this in a fresh sid debootstrap, using
tcpdump to capture the handshakes and analyzing them with Wireshark.
I also tested with my local browser (Chrome on Windows 7) for
comparison, which worked.  I narrowed it down to Atlassian's
webservers requiring the presence of the rsa_pkcs1_sha1 signature
algorithm in the signature algorithm list of the handshake, even
though this algorithm is never used.  The openssl cipherlist
preference of "DEFAULT at SECLEVEL=2" prevents this algorithm from being
added to the list, even if explicitly given via openssl s_client's
sigalgs parameter.  Changing the cipherlist to "DEFAULT at SECLEVEL=1"
doesn't change the ciphers offered, but does allow rsa_pkcs1_sha1 to
be sent in the signature algorithm list, and the handshake succeeds.
The only difference between the values of SECLEVEL is that 1 includes
the 3 SHA1 signature algorithms (1 each for DSA, RSA, and ECDSA) in
the signature algorithm list, whereas 2 does not.

-dwfreed



More information about the Python-apps-team mailing list