Hi clamav-users,

I just upgraded one of our Linux machines from Ubuntu 18.04 to 20.04. It 
seems that the ClamAV package (although having the same version as in 
18.04) has been built with stronger OpenSSL/cURL flags.

Freshclam is no longer able to fetch definition updates due to a weak 
SSL certificate that is presented by our (crappy) corporate proxy:

   * Connected to proxy.company.lan (172.22.xxx.yyy) port 8080 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to database.clamav.net:443
> CONNECT database.clamav.net:443 HTTP/1.1
Host: database.clamav.net:443
User-Agent: ClamAV/0.102.4 (OS: linux-gnu, ARCH: x86_64, CPU: x86_64)
Proxy-Connection: Keep-Alive
< HTTP/1.1 200 Connection established
< Proxy-Connection: keep-alive
<
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
    CApath: /etc/ssl/certs
* CONNECT phase completed!
* CONNECT phase completed!
* SSL certificate problem: *EE certificate key too weak*
* Closing connection 0


I know that the proxy is bad and you can't imagine how much I hate 
SSL-breaking 'enterprise' security gear, but I cannot do anything about 
it. Is there a way to make freshclam (or the SSL library it uses) accept 
weak certificates? Something like '-k' for curl?

I've already tried changing to plain HTTP for database downloads, but 
this doesn't work either:

   !downloadFile: Unexpected response (0) from 
http://database.clamav.net/daily.cvd (Proxy: proxy.company.lan:8080)


Thanks in advance for any recommendations!


Best regards,

Alex

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to