Re: [squid-users] SSLBump SSL error (FAO Henrik)

From: Alex Crow <alex_at_nanogherkin.com>
Date: Sun, 19 Feb 2012 19:05:34 +0000

Henrik,

  19/02/12 09:47, Henrik Nordström wrote:
> tis 2012-02-14 klockan 12:20 +0000 skrev Alex Crow:
>
>> Strangely s_client without any additional parameters seems to work:
>
>> OpenSSL> s_client -connect applyonline.abbeynational.co.uk:443
>> CONNECTED(00000003)
> Do not work for me when testing this site.
>
> $ openssl s_client -connect applyonline.abbeynational.co.uk:443
> CONNECTED(00000003)
> 140471392831296:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
> failure:s23_lib.c:177:
> ---
> no peer certificate available
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 0 bytes and written 113 bytes
> ---
> New, (NONE), Cipher is (NONE)
> Secure Renegotiation IS NOT supported
> Compression: NONE
> Expansion: NONE
> ---
>
> Which version of OpenSSL are you testing with?
>
> $ openssl version
> OpenSSL 1.0.0g-fips 18 Jan 2012
>
>

openssl version
OpenSSL 0.9.8o 01 Jun 2010

Interestingly if I specify a servername I get the same (or similar) as you:

root_at_webproxy2:~# openssl s_client -connect
applyonline.abbeynational.co.uk:443 -cipher 'ALL:!COMPLEMENTOFDEFAULT'
-servername applyonline.abbeynational.co.uk
CONNECTED(00000003)
31274:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
failure:s23_lib.c:188:
root_at_webproxy2:~#

>> New, TLSv1/SSLv3, Cipher is RC4-MD5
> And I get here if I enable SSLv2 ciphers, making OpenSSL send an SSLv2
> formatted hello handshake.
>
> $ openssl s_client -connect applyonline.abbeynational.co.uk:443 -cipher
> 'ALL:!COMPLEMENTOFDEFAULT'
> [...]
> New, TLSv1/SSLv3, Cipher is RC4-MD5
>
>

Running the same as above seems for me exactly the same as without the
cipher options:

root_at_webproxy2:~# openssl s_client -connect
applyonline.abbeynational.co.uk:443 -cipher 'ALL:!COMPLEMENTOFDEFAULT'
CONNECTED(00000003)
depth=3 /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification
Authority
verify error:num=19:self signed certificate in certificate chain
verify return:0

---
Certificate chain
  0 s:/C=GB/ST=Buckinghamshire/L=Milton Keynes/O=GRUPO SANTANDER/OU=IT 
Security Operations/CN=applyonline.abbeynational.co.uk
    i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use 
at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 International 
Server CA - G3
  1 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use 
at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 International 
Server CA - G3
    i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 
VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public 
Primary Certification Authority - G5
  2 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 
VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public 
Primary Certification Authority - G5
    i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification 
Authority
  3 s:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification 
Authority
    i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification 
Authority
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIFoDCCBIigAwIBAgIQTjHebyXhySJF0PmYv7PGHTANBgkqhkiG9w0BAQUFADCB
vDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL
ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug
YXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykxMDE2MDQGA1UEAxMt
VmVyaVNpZ24gQ2xhc3MgMyBJbnRlcm5hdGlvbmFsIFNlcnZlciBDQSAtIEczMB4X
DTExMDIxODAwMDAwMFoXDTEyMDIyNTIzNTk1OVowgaQxCzAJBgNVBAYTAkdCMRgw
FgYDVQQIEw9CdWNraW5naGFtc2hpcmUxFjAUBgNVBAcUDU1pbHRvbiBLZXluZXMx
GDAWBgNVBAoUD0dSVVBPIFNBTlRBTkRFUjEfMB0GA1UECxQWSVQgU2VjdXJpdHkg
T3BlcmF0aW9uczEoMCYGA1UEAxQfYXBwbHlvbmxpbmUuYWJiZXluYXRpb25hbC5j
by51azCCASEwDQYJKoZIhvcNAQEBBQADggEOADCCAQkCggEAaUp4WbQ0wQ2w0vAV
rSCIeH7e+C3TN9Fx2BLlndEYvDRYWyt44hSkYidrkppqiGMC9WCfRFd7HVqlKxey
6yZzNIV4vEHnvs62NPQcN9Fq3+FVONd6eBl83nY7GG2OUpYQoDkiVYu9XbdHy75Z
C5YAvnJqE+b1eHCeIu06kGdE0fK9j+FUsbyeS/MaP77M/ymPsKhr9N4LWlQdtlnn
g0/U32jq8IwZ73XcLLTtRe7ScpkOkgYyhwFrfSdaCM/kygrfJahUzur1rq438J8b
FwakDBH/p4opnCCCP3UCjSw7drtIlKi7Z3lQ+xkYmSICKiPhLtchsyWFRBrVe36r
72po1QIDAQABo4IBszCCAa8wCQYDVR0TBAIwADALBgNVHQ8EBAMCBaAwQQYDVR0f
BDowODA2oDSgMoYwaHR0cDovL1NWUkludGwtRzMtY3JsLnZlcmlzaWduLmNvbS9T
VlJJbnRsRzMuY3JsMEQGA1UdIAQ9MDswOQYLYIZIAYb4RQEHFwMwKjAoBggrBgEF
BQcCARYcaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYTAoBgNVHSUEITAfBglg
hkgBhvhCBAEGCCsGAQUFBwMBBggrBgEFBQcDAjByBggrBgEFBQcBAQRmMGQwJAYI
KwYBBQUHMAGGGGh0dHA6Ly9vY3NwLnZlcmlzaWduLmNvbTA8BggrBgEFBQcwAoYw
aHR0cDovL1NWUkludGwtRzMtYWlhLnZlcmlzaWduLmNvbS9TVlJJbnRsRzMuY2Vy
MG4GCCsGAQUFBwEMBGIwYKFeoFwwWjBYMFYWCWltYWdlL2dpZjAhMB8wBwYFKw4D
AhoEFEtruSiWBgy70FI4mymsSweLIQUYMCYWJGh0dHA6Ly9sb2dvLnZlcmlzaWdu
LmNvbS92c2xvZ28xLmdpZjANBgkqhkiG9w0BAQUFAAOCAQEAVTT7cczhZ0mVVRHn
4pLe4780UCOIlXDyABI23B1XdZBm6fUcVB+JKPKpD6J31iSXnWuHdb6sjMLfzq45
1XFZ/v6wB2cvK2KMeAvedDp+1/R2HoCjrPPOFS42HEFks7kQ2/xaV2gHYOVnoG/V
RwvT94vtI1xUZAs87QxLUtvGcedcQnHyCmt3Wp5xTll7/czrYSLZFuELfPeckQ4v
ZI0XuWn1uwVURn7pfpK62044Zg6Zwz9gsicHbHavgUZds+dKSLKPPzV4ElJT9kzJ
E1lWAUgpMppmYJdJxJUJ5nOAi5P355Mp/TAsj2BU/QSzxodwvE0vW7+TBb5b9nrj
gZCdzQ==
-----END CERTIFICATE-----
subject=/C=GB/ST=Buckinghamshire/L=Milton Keynes/O=GRUPO SANTANDER/OU=IT 
Security Operations/CN=applyonline.abbeynational.co.uk
issuer=/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use 
at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 International 
Server CA - G3
---
No client certificate CA names sent
---
SSL handshake has read 4982 bytes and written 431 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-MD5
Server public key is 2047 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
     Protocol  : TLSv1
     Cipher    : RC4-MD5
     Session-ID: 
0000B79232B42C2298F70DA4D4A45E0EA4410490585858584F41469200000030
     Session-ID-ctx:
     Master-Key: 
81A71B010B49871DE1DD86782FBBA28834C12D78363C4DB1E8DD116D17D5A447E196C2B5F89AC49AFC3A8C0FF0663CC0
     Key-Arg   : None
     Start Time: 1329677743
     Timeout   : 300 (sec)
     Verify return code: 19 (self signed certificate in certificate chain)
---
^C
root_at_webproxy2:~#
>> Unless that verify return code is a problem?
> For me it's not.
>
>> I really don't know where to go from here...
> Fire up wireshark and stare at any difference in the SSL handshake
> presented by OpenSSL when called by Squid compared to when using the
> openssl s_client command.
>
> Just tried, and it's sending a SSLv3/TLSv1 handshake even with the
> sslproxy_ciphers set to the same that works with openssl_sclient.
OK, so squid *is* behaving differently from OpenSSL s_client.
> But seriously, the right action is to complain to the site owners to
> have the site fixed. A SSLv3/TLSv1 server requiring the initial client
> hello handshake to be SSLv2 with SSLv3/TLSv1 chiphers and failing if
> seeing an SSLv3/TLSv1 handshake is just broken.
Hmm, I can try, but I can't imaging someone like Santander giving two 
hoots about an organisation of our size... and we have about 15 more 
"big" corporate sites we contact that behave in a similar fashion.
> Regards
> Henrik
>
Many thanks
Alex
Received on Sun Feb 19 2012 - 19:05:38 MST

This archive was generated by hypermail 2.2.0 : Mon Feb 20 2012 - 12:00:03 MST