[Bug 1874413] Re: openssl 1.1.1f-1ubuntu2 breaks some TLS connections

Marc Deslauriers marc.deslauriers at canonical.com
Thu Apr 23 11:42:16 UTC 2020


*** This bug is a duplicate of bug 1864689 ***
    https://bugs.launchpad.net/bugs/1864689

Hi, thanks for reporting this issue.

This isn't caused by the patch for CVE-2020-1967, it is caused by
OPENSSL_TLS_SECURITY_LEVEL=2 being set as the minimum security level.

You can try it with a lowered security level by doing the following:

curl -v --ciphers 'DEFAULT:@SECLEVEL=1' https://pub.orcid.org

I believe it is caused by having an insecure SHA1 certificate in their
chain:

- Certificate[3] info:
 - subject `OU=Go Daddy Class 2 Certification Authority,O=The Go Daddy Group\, Inc.,C=US', issuer `OU=Go Daddy Class 2 Certification Authority,O=The Go Daddy Group\, Inc.,C=US', serial 0x00, RSA key 2048 bits, signed using RSA-SHA1 (broken!), activated `2004-06-29 17:06:20 UTC', expires `2034-06-29 17:06:20 UTC', pin-sha256="VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8="


As such, I am marking this as a dupe of bug 1864689, you can follow progress on the issue there.

Thanks.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-1967

** This bug has been marked a duplicate of bug 1864689
   openssl in 20.04 can't connect to site that was fine in 19.10 and is fine in Chrome and Firefox

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1874413

Title:
  openssl 1.1.1f-1ubuntu2 breaks some TLS connections

Status in openssl package in Ubuntu:
  New

Bug description:
  On a machine with Ubuntu 20.04 and all available updates installed
  (including openssl and libssl1.1 1.1.1f-1ubuntu2):

  user at host:~$ curl 'https://pub.orcid.org/'
  curl: (35) error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure

  On the same machine, but with the openssl and libssl1.1 packages
  downgraded to version 1.1.1c-1ubuntu4 from Ubuntu 19.10:

  user at host:~$ curl -I 'https://pub.orcid.org/'
  HTTP/1.1 302 Found
  Server: nginx/1.16.1
  Date: Thu, 23 Apr 2020 09:34:38 GMT
  Location: https://pub.orcid.org/v3.0/
  Transfer-Encoding: chunked
  Connection: Keep-Alive
  Set-Cookie: X-Mapping-fjhppofk=EDEB8B375DA428655747278237992826; path=/

  I've also checked this with machines running other distros (OpenWRT
  and Archlinux), and with those distros, the error occurs neither with
  OpenSSL/libssl1.1 1.1.1f nor with OpenSSL/libssl1.1 1.1.1g. This leads
  me to assume that the backported patch for CVE-2020-1967 in
  openssl/libssl1.1 1.1.1f-1ubuntu2 is broken.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1874413/+subscriptions



More information about the foundations-bugs mailing list