Nevermind - I mistype the define - it works.

Thanks again,

-John



On Thu, Sep 12, 2013 at 5:10 PM, John Hynes <jephy...@gmail.com> wrote:

> After applying the patch, and recompiling with SSL_OP_NO_TLSv1_2, sendmail
> still gives the same error, although the -no-tls1_2 option gets the test to
> work.
>
> Are there other defines I need perhaps?
>
> -John
>
>
>
> On Thu, Sep 12, 2013 at 3:54 PM, Claus Assmann 
> <ca+openbsd_m...@esmtp.org>wrote:
>
>> On Thu, Sep 12, 2013, John Hynes wrote:
>>
>> > openssl s_client -starttls smtp -connect mail.dean.edu:25
>> >
>> > ...from any of my OpenBSD 5.3 hosts, I get the same response:
>>
>> > CONNECTED(00000003)
>> > 12556912661392:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
>> > failure:/usr/src/lib/libssl/ssl/../src/ssl/s23_lib.c:177:
>>
>> Add -no_tls1_2 to your call.
>>
>> If that works, add some options to sendmail to make SSL_OP_NO_TLSv1_2
>> available:
>>
>> diff -ru sendmail-8.14.7/sendmail/readcf.c
>> sendmail-8.14.7-new/sendmail/readcf.c
>> --- sendmail-8.14.7/sendmail/readcf.c   2013-03-15 17:54:12.000000000
>> +0000
>> +++ sendmail-8.14.7-new/sendmail/readcf.c       2013-06-24
>> 14:26:01.000000000 +0100
>> @@ -2303,13 +2303,16 @@
>>         long            sslopt_bits;    /* bits to set/clear */
>>  } SSL_Option[] =
>>  {
>> -/* these are turned on by default */
>> +/* Bugs (and some others) are turned on by default */
>>  #ifdef SSL_OP_MICROSOFT_SESS_ID_BUG
>>         { "SSL_OP_MICROSOFT_SESS_ID_BUG",
>> SSL_OP_MICROSOFT_SESS_ID_BUG    },
>>  #endif
>>  #ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG
>>         { "SSL_OP_NETSCAPE_CHALLENGE_BUG",
>>  SSL_OP_NETSCAPE_CHALLENGE_BUG   },
>>  #endif
>> +#ifdef SSL_OP_LEGACY_SERVER_CONNECT
>> +       { "SSL_OP_LEGACY_SERVER_CONNECT",
>> SSL_OP_LEGACY_SERVER_CONNECT    },
>> +#endif
>>  #ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
>>         { "SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG",
>>  SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG },
>>  #endif
>> @@ -2346,9 +2349,18 @@
>>  #ifdef SSL_OP_NO_TICKET
>>         { "SSL_OP_NO_TICKET",   SSL_OP_NO_TICKET        },
>>  #endif
>> +#ifdef SSL_OP_CISCO_ANYCONNECT
>> +       { "SSL_OP_CISCO_ANYCONNECT",    SSL_OP_CISCO_ANYCONNECT },
>> +#endif
>>  #ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
>>         { "SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION",
>>  SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION   },
>>  #endif
>> +#ifdef SSL_OP_NO_COMPRESSION
>> +       { "SSL_OP_NO_COMPRESSION",      SSL_OP_NO_COMPRESSION   },
>> +#endif
>> +#ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
>> +       { "SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION",
>> SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION        },
>> +#endif
>>  #ifdef SSL_OP_SINGLE_ECDH_USE
>>         { "SSL_OP_SINGLE_ECDH_USE",     SSL_OP_SINGLE_ECDH_USE  },
>>  #endif
>> @@ -2373,6 +2385,12 @@
>>  #ifdef SSL_OP_NO_TLSv1
>>         { "SSL_OP_NO_TLSv1",    SSL_OP_NO_TLSv1 },
>>  #endif
>> +#ifdef SSL_OP_NO_TLSv1_2
>> +       { "SSL_OP_NO_TLSv1_2",  SSL_OP_NO_TLSv1_2       },
>> +#endif
>> +#ifdef SSL_OP_NO_TLSv1_1
>> +       { "SSL_OP_NO_TLSv1_1",  SSL_OP_NO_TLSv1_1       },
>> +#endif
>>  #ifdef SSL_OP_PKCS1_CHECK_1
>>         { "SSL_OP_PKCS1_CHECK_1",       SSL_OP_PKCS1_CHECK_1    },
>>  #endif
>> @@ -2385,6 +2403,9 @@
>>  #ifdef SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG
>>         { "SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG",
>> SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG  },
>>  #endif
>> +#ifdef SSL_OP_CRYPTOPRO_TLSEXT_BUG
>> +       { "SSL_OP_CRYPTOPRO_TLSEXT_BUG",
>>  SSL_OP_CRYPTOPRO_TLSEXT_BUG     },
>> +#endif
>>         { NULL,         0               }
>>  };
>>  #endif /* STARTTLS && _FFR_TLS_1 */

Reply via email to