Your message dated Sat, 11 Jul 2020 11:47:10 +0000
with message-id <[email protected]>
and subject line Bug#961889: fixed in gnutls28 3.6.7-4+deb10u5
has caused the Debian Bug report #961889,
regarding src:gnutls28: Fails building chains with expired intermediate 
regardless of trust store
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
961889: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961889
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:gnutls28
Version: 3.6.7-4+deb10u3
Severity: grave
Justification: renders package unusable

Hi,

gnutls appears to fail building a certificate chain, if:
- the server sends an alternate chain with an expired intermediate
- a matching root is in the local trust store.

This was found because the "AddTrust External CA Root" [1] expired today,
and it was used - a long time ago - to cross-sign the "USERTrust RSA
Certification Authority" Root CA. When a server sends the cross-signed
certificate, gnutls thinks the entire chain is invalid, even though the
not-expired root is contained in its trust store.

Example:

    $ gnutls-cli apt.puppet.com:443
    Processed 129 CA certificate(s).
    Resolving 'apt.puppet.com:443'...
    Connecting to '2600:9000:2043:2200:1d:fc37:1cc0:93a1:443'...
    - Certificate type: X.509
    - Got a certificate list of 3 certificates.
    - Certificate[0] info:
     - subject `CN=apt.puppet.com,OU=PositiveSSL Multi-Domain,OU=Domain Control 
Validated', issuer `CN=Gandi Standard SSL CA 2,O=Gandi,L=Paris,ST=Paris,C=FR', 
serial 0x00d50b93f3f071150e62d87aee147a1520, RSA key 2048 bits, signed using 
RSA-SHA256, activated `2019-07-18 00:00:00 UTC', expires `2020-07-18 23:59:59 
UTC', pin-sha256="oBlhqVlMzd0j01OweaExY7LRykSLER7Cyml3qM9Rp4M="
        Public Key ID:
            sha1:c94ab18efcc44ba3c51d39f831a734ad4e78e60b
            
sha256:a01961a9594ccddd23d353b079a13163b2d1ca448b111ec2ca6977a8cf51a783
        Public Key PIN:
            pin-sha256:oBlhqVlMzd0j01OweaExY7LRykSLER7Cyml3qM9Rp4M=

    - Certificate[1] info:
     - subject `CN=Gandi Standard SSL CA 2,O=Gandi,L=Paris,ST=Paris,C=FR', 
issuer `CN=USERTrust RSA Certification Authority,O=The USERTRUST 
Network,L=Jersey City,ST=New Jersey,C=US', serial 
0x05e4dc3b9438ab3b8597cba6a19850e3, RSA key 2048 bits, signed using RSA-SHA384, 
activated `2014-09-12 00:00:00 UTC', expires `2024-09-11 23:59:59 UTC', 
pin-sha256="WGJkyYjx1QMdMe0UqlyOKXtydPDVrk7sl2fV+nNm1r4="
    - Certificate[2] info:
     - subject `CN=USERTrust RSA Certification Authority,O=The USERTRUST 
Network,L=Jersey City,ST=New Jersey,C=US', issuer `CN=AddTrust External CA 
Root,OU=AddTrust External TTP Network,O=AddTrust AB,C=SE', serial 
0x13ea28705bf4eced0c36630980614336, RSA key 4096 bits, signed using RSA-SHA384, 
activated `2000-05-30 10:48:38 UTC', expires `2020-05-30 10:48:38 UTC', 
pin-sha256="x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4="
    - Status: The certificate is NOT trusted. The certificate chain uses 
expired certificate.
    *** PKI verification of server certificate failed...
    *** Fatal error: Error in the certificate.

Note that modern browsers, and OpenSSL 1.1.1 has no problem with this
server.

Obviously, this also breaks APT.

I'm marking this grave, as GnuTLS doesn't seem to follow standards here,
various other software just works, GnuTLS-using clients all break, and
many many sites on the public Internet send the cross-signed
certificate.

Thanks,
Chris

[1] https://crt.sh/?id=1


-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-9-amd64 (SMP w/12 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

--- End Message ---
--- Begin Message ---
Source: gnutls28
Source-Version: 3.6.7-4+deb10u5
Done: Andreas Metzler <[email protected]>

We believe that the bug you reported is fixed in the latest version of
gnutls28, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Metzler <[email protected]> (supplier of updated gnutls28 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 07 Jun 2020 07:45:55 +0200
Source: gnutls28
Architecture: source
Version: 3.6.7-4+deb10u5
Distribution: buster
Urgency: medium
Maintainer: Debian GnuTLS Maintainers <[email protected]>
Changed-By: Andreas Metzler <[email protected]>
Closes: 956649 958704 961889
Changes:
 gnutls28 (3.6.7-4+deb10u5) buster; urgency=medium
 .
   * 42_rel3.6.11_10-session-tickets-parse-extension-during-session-resum.patch
     from GNUTLS 3.6.11: Fix TL1.2 resumption errors. Closes: #956649
   * 47_rel3.6.13_10-session_pack-fix-leak-in-error-path.patch from GNUTLS
     3.6.14: One line fix for memory leak. Closes: #958704
   * Rename
     44_rel3.6.14_01-stek-differentiate-initial-state-from-valid-time-win.patch
     (security upload) to 44_rel3.6.14_90_... to be able to pull earlier fixes
     from 3.6.14 and have correct patch filename order.
   * 44_rel3.6.14_10-Update-session_ticket.c-to-add-support-for-zero-leng.patch
     from GnuTLS 3.6.14: Handle zero length session tickets, fixing connection
     errors on TLS1.2 sessions to some big hosting providers. (See LP 1876286)
   * 44_rel3.6.14_15-_gnutls_pkcs11_verify_crt_status-check-validity-agai.patch
     44_rel3.6.14_16-x509-trigger-fallback-verification-path-when-cert-is.patch
     44_rel3.6.14_17-tests-add-test-case-for-certificate-chain-supersedin.patch
     backported from GnuTLS 3.6.14: Fix verification error with alternate
     chains. Closes: #961889
Checksums-Sha1: 
 0f3085ef934677faf9868dac0a6b1e66e11ffbb6 3354 gnutls28_3.6.7-4+deb10u5.dsc
 aaa80acf0e41d6b8caaf179a61f31b4ee0908feb 89484 
gnutls28_3.6.7-4+deb10u5.debian.tar.xz
Checksums-Sha256: 
 d91aef3a450b7dceef817264996a3c11b72dd7fb8e892897b63d7e52bd078e4a 3354 
gnutls28_3.6.7-4+deb10u5.dsc
 d719d468f59aef1c480dda91ffee6d0c728e8635a0808f199d999d04f128b70a 89484 
gnutls28_3.6.7-4+deb10u5.debian.tar.xz
Files: 
 fd8beca0f120bfb950ca710e74b8f5de 3354 libs optional 
gnutls28_3.6.7-4+deb10u5.dsc
 87d11e99d6d39916de65b019d7cd0e87 89484 libs optional 
gnutls28_3.6.7-4+deb10u5.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=W8Lc
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to