Hi Marc,
here are the protocol details for my internal mirror.
Protocol Details
DROWN No, server keys and hostname not seen elsewhere with SSLv2
(1) For a better understanding of this test, please read this longer
explanation
(2) Key usage data kindly provided by the Censys network search engine;
original DROWN website here
(3) Censys data is only indicative of possible key and certificate
reuse; possibly out-of-date and not complete
Secure Renegotiation Supported
Secure Client-Initiated Renegotiation No
Insecure Client-Initiated Renegotiation No
BEAST attack Not mitigated server-side (more info) TLS 1.0: 0x2f
POODLE (SSLv3) No, SSL 3 not supported (more info)
POODLE (TLS) No (more info)
Zombie POODLE No (more info) TLS 1.2 : 0x002f
GOLDENDOODLE No (more info) TLS 1.2 : 0x002f
OpenSSL 0-Length No (more info) TLS 1.2 : 0x002f
Sleeping POODLE No (more info) TLS 1.2 : 0x002f
Downgrade attack prevention Yes, TLS_FALLBACK_SCSV supported (more info)
SSL/TLS compression No
RC4 No
Heartbeat (extension) No
Heartbleed (vulnerability) No (more info)
Ticketbleed (vulnerability) No (more info)
OpenSSL CCS vuln. (CVE-2014-0224) No (more info)
OpenSSL Padding Oracle vuln.
(CVE-2016-2107) No (more info)
ROBOT (vulnerability) No (more info)
Forward Secrecy With some browsers (more info)
ALPN Yes http/1.1
NPN No
Session resumption (caching) Yes
Session resumption (tickets) Yes
OCSP stapling No
Strict Transport Security (HSTS) Yes
max-age=15768000
HSTS Preloading Not in: Chrome Edge Firefox IE
Public Key Pinning (HPKP) No (more info)
Public Key Pinning Report-Only No
Public Key Pinning (Static) No (more info)
Long handshake intolerance No
TLS extension intolerance No
TLS version intolerance No
Incorrect SNI alerts No
Uses common DH primes No
DH public server param (Ys) reuse No
ECDH public server param reuse No
Supported Named Groups secp256r1, secp384r1, secp521r1, x25519, x448
(Server has no preference)
SSL 2 handshake compatibility Yes
0-RTT enabled No
Here is the diff of the protocol details for my not working internal
server and the artfiles openbsd mirror.
1d0
< Protocol Details
9c8
< BEAST attack Not mitigated server-side (more info) TLS 1.0: 0x2f
---
> BEAST attack Not mitigated server-side (more info) TLS 1.0: 0xc013
12,15c11,14
< Zombie POODLE No (more info) TLS 1.2 : 0x002f
< GOLDENDOODLE No (more info) TLS 1.2 : 0x002f
< OpenSSL 0-Length No (more info) TLS 1.2 : 0x002f
< Sleeping POODLE No (more info) TLS 1.2 : 0x002f
---
> Zombie POODLE No (more info) TLS 1.2 : 0xc027
> GOLDENDOODLE No (more info) TLS 1.2 : 0xc027
> OpenSSL 0-Length No (more info) TLS 1.2 : 0xc027
> Sleeping POODLE No (more info) TLS 1.2 : 0xc027
26c25
< Forward Secrecy With some browsers (more info)
---
> Forward Secrecy Yes (with most browsers) ROBUST (more info)
32,33c31
< Strict Transport Security (HSTS) Yes
< max-age=15768000
---
> Strict Transport Security (HSTS) No
45c43
< Supported Named Groups secp256r1, secp384r1, secp521r1, x25519, x448
(Server has no preference)
---
> Supported Named Groups x25519, secp256r1, x448, secp521r1, secp384r1
(server preferred order)
47d44
< 0-RTT enabled No
Best regards,
Sven
On 2/1/20 1:36 PM, Marc Espie wrote:
On Sat, Feb 01, 2020 at 12:48:40PM +0100, Sven Wolf wrote:
Hi,
I did some debugging on the server side.
Even with loglevel trace5 and also different TLS versions (I tested 1.1, 1.2
and 1.3) I didn't find the root cause.
In the attachment you'll find the export of the Apache error log with
loglevel trace5. Maybe it's helpfull for the libressl developers.
On the client side I just did an pkg_add -v bash
Best regards,
Sven
If you can expose that server to the outside world, try
https://www.ssllabs.com/
what does the report say, especially wrt session resumption ?