Hi Walter,

> Your system may not allow older TLS connections.

Exactly, and this is why I currently have to use a custom weakened 
openssl.cnf by the curl-based Ansible playbook. However, the environment 
variable OPENSSL_CONF, referring to the custom OpenSSL config, is ignored 
when I use "ansible.builtin.uri". Actually, "ansible.builtin.uri" even 
ignores by OpenSSL config located in the default path /etc/ssl/openssl.cnf 
on my Debian 12.6 system:

-----BEGIN SHELL-----
$ cat /etc/ssl/openssl.cnf
openssl_conf = openssl_init

[openssl_init]
ssl_conf = ssl_sect

[ssl_sect]
system_default = system_default_sect

[system_default_sect]
MinProtocol = TLSv1
CipherString = DEFAULT@SECLEVEL=0
Options = UnsafeLegacyRenegotiation


$ ansible-playbook -vvv test.yml
...
"msg": "Status code was -1 and not [200]: Request failed: <urlopen error 
[SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] sslv3 alert handshake failure 
(_ssl.c:1000)>",
...
-----END SHELL-----


Thank you.

Regards,
Garri

On Thursday, August 15, 2024 at 1:15:22 PM UTC+2 Rowe, Walter P. (Fed) 
wrote:

> Check your system settings. Your system may not allow older TLS 
> connections. TLS 1.0 is compromised and therefore no longer allowed by many 
> systems. 
>
> What platform is your control host?
>
> Walter
> --
> Walter Rowe, Division Chief
> Infrastructure Services Division
> Mobile: 202.355.4123 <(202)%20355-4123> 
>
> On Aug 15, 2024, at 5:00 AM, Garri Djavadyan <g.dja...@gmail.com> wrote:
>
> Hi Steve,
>
> > Did you try with SECLEVEL=0 ?
>
> Yes, I did. However, the result is the same: Ansible controller is not 
> happy with the bare TLS 1.0 reply from the legacy box:
>
> "msg": "Status code was -1 and not [200]: Request failed: <urlopen error 
> [SSL: UNSUPPORTED_PROTOCOL] unsupported protocol (_ssl.c:1000)>"
>
>
> - name: Query legacy boxes
>   hosts: legacyboxes
>   gather_facts: false
>   connection: local
>   tasks:
>     - name: GET the home page
>       ansible.builtin.uri:
>         url: https://{{ ansible_host }}
>         ciphers:
>           - 'DEFAULT@SECLEVEL=0'
>           
>
> Again, ciphers-wise, the setup is fine, but I do not think it is possible 
> to enforce the minimum TLS protocol version with the cipher string.
>
> Thank you.
>
> Regards,
> Garri 
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "Ansible Project" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to ansible-proje...@googlegroups.com.
>
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/ansible-project/85e58522-271e-45aa-832a-8a2a7c6b5a38n%40googlegroups.com
>  
> <https://groups.google.com/d/msgid/ansible-project/85e58522-271e-45aa-832a-8a2a7c6b5a38n%40googlegroups.com?utm_medium=email&utm_source=footer>
> .
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ansible-project+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/fe2f9e80-a54e-4ffc-87f1-bdfe8788c858n%40googlegroups.com.

Reply via email to