On Mon, Oct 21, 2013 at 11:49:48PM +0200, li...@rhsoft.net wrote:

> >> since you sound very knowledgeable about SSL may you consider
> >> to make a comment there?
> >>
> >> https://bugzilla.redhat.com/show_bug.cgi?id=1019251
> > 
> > I have enough fish to fry.  The problem is obvious, client promises
> > EECDH support, server sends a standard curve name and the client
> > promptly fails because its list of supported curves is incomplete.
> > 
> > Of course you should capture a session with wireshark and see what
> > curve the server sends back to confirm this obvious interpretation.
> 
> looking at the logs where ECDHE worked fine with the intermediate openssl
> and started to fail to "mx00.gmx.net" after the crippleded update I
> think the situation is clear

What is less clear is what EC curve gmx.de actually sends down the
wire.  Is it something exotic, that few sites would support, or is
it something more vanilla like secp521r1 which RedHat seem to have
deliberately left out of their implementation.

> >> fine:     http://koji.fedoraproject.org/koji/buildinfo?buildID=471397
> >> crippled: http://koji.fedoraproject.org/koji/buildinfo?buildID=471781
> >>
> >> with the first build no single error
> > 
> > I think you know what to do...
> 
> maintain openssl at my own is above my scope i fear :-(

No, you report the bug.  You're running their software, you can
reproduce failure cases.  Make it clear to them that half-implementing
EC support is worse than not implementing EC support.

> i hate it to ask but is there any change postfix avoids ECDHE for such 
> destinations
> in case of this situation and continues to use DHE if the requested curve is 
> not
> available in the linked openssl library?

Postfix allows you to skip EECDH and ECDSA globally or for selected sites via
smtp_tls_policy_maps.

    main.cf:
        # SMTP client only:
        smtp_tls_exclude_ciphers = ECDH

    tls_policy:
        example.com encrypt exclude=ECDH protocols=!SSLv2,!SSLv3

If you disable SSLv3 (as well as SSLv2) your SMTP client will send
the list of supported EC curves to the server via a suitable TLSv1
extension.

Some servers may be able to make use of this to choose a compatible
curve.  Postfix is not among these yet, as OpenSSL does not yet
(before the unreleased 1.0.2 version) expose the requisite API
functions to allow server applications to register multiple curves
or leave the choice to OpenSSL.

So mostly, you lose, until RedHat fixes the bug.

> > When I test connections to this host,  I always get "AES256-SHA",
> > and no EDH or kEECDH ciphers are accepted.  Did gmx.de change their
> > configuration to work around this?  Can you build posttls-finger (from 2.11)
> > and test with:
> > 
> >     $ posttls-finger -t30 -T 180 -p TLSv1.2 -Ldebug \
> >     -o tls_medium_cipherlist='kEECDH:kEDH:kRSA' \
> >     "[213.165.67.99]"
> > 
> > do you get handshake failures?
> 
> no "posttls-finger" here but the logs below are a clear language i think

The idea is to compile it from 2.11 snapshot sources.

-- 
        Viktor.

Reply via email to