On 2022-12-10, Alceu Rodrigues de Freitas Junior <glasswal...@yahoo.com.br> 
wrote:
> If I read correctly, the Mikrotik is using an SSLv3 certificate, which I 
> guess shouldn't be in use anymore.

There's no such thing as "an SSLv3 certificate", they are all just X.509
certs. The sslv3 refers to the type of alert, sslv3 alerts are still
used in TLS; SSLv3 itself hasn't been supported for years.

It doesn't necessarily use a certificate anyway, it may well be using
ADH for this. Federico, do you have a cert configured for the api-ssl
service on the routeros device, in "/ip service print"?

> Em 10/12/2022 17:01, Federico Giannici escreveu:
>> Since I upgraded from OpenBSD 7.1 to 7.2 (amd64) I'm no longer able to 
>> use IO::Socket::SSL perl library to connect to some devices (Mikrotik 
>> routers, via their API).
>> 
>> This is the only debug info I was able to obtain:
>> 
>> DEBUG: .../IO/Socket/SSL.pm:842: local error: SSL connect attempt failed 
>> error:14004410:SSL routines:CONNECT_CR_SRVR_HELLO:sslv3 alert handshake 
>> failure

Maybe try connecting with openssl s_client too? That would help show if
it's a problem specific to IO::Socket::SSL or something more general.

>> Unfortunately it seems that both perl functions 
>> Net::SSLeay::set_security_level() and 
>> Net::SSLeay::CTX_set_security_level() don't work. I get the following 
>> error. Maybe they are not implemented in our version of Net::SSLeay perl 
>> library?

The security level stuff was only recently added to libressl, it is still
hidden behind #ifndef for libressl in p5-Net-SSLeay. I think you can set
it in the ciphers string though, if it is ADH maybe you need something like
"ADH:ALL:@SECLEVEL=0" (though in that case you would probably be better
advised to generate and use certificates instead).

-- 
Please keep replies on the mailing list.

Reply via email to