Behaviour of security/lastpass-cli changed on current (OpenBSD 6.8-beta
(GENERIC.MP) #69: Tue Sep 15 12:34:41 MDT 2020). Attempting to login to
a lastpass account results in a SSL connect error. Expected behaviour is
that lpass asks for a password.

$ lpass login user
Error: SSL connect error.

A bit more info:

$ LPASS_LOG_LEVEL=8 lpass login user; cat ~/.lpass/lpass.log
Error: SSL connect error.
<7> [1600697212.073792] Making request to
https://lastpass.com/iterations.php
Trying 104.98.132.96:443...
* Connected to lastpass.com (104.98.132.96) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/cert.pem
    CApath: none
* error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca
* Closing connection 0


After a bit of bisecting I found that the change in behaviour is caused
by a recent change in lib/libcrypto/x509/x509_vpm.c (r1.22). Log
message: "re-enable new x509 chain verifier as the default". Reverting
this commit fixes the above, thus enabling me to login to lastpass again.

Is the change in behaviour of the new x509 chain verifier intended?

Instead of reverting lib/libcrypto/x509/x509_vpm.c to r1.21 there is a
workaround: Addition of the certificate pin of lastpass.com to
lastpass-cli's pins list
(https://github.com/lastpass/lastpass-cli/blob/master/pins.h). I have a
diff but I'm not sure if this is a sane solution. Does it make sense to
patch lastpass-cli?

Reply via email to