[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-24 Thread Bruce Elrick
All autopackage tests succeeded after multiple trials. Canonical customer with golang client against openssl server, where bug was first noticed, will be testing. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-19 Thread Bruce Elrick
Several of the autopkgtest failures are due to response issues (e.g.curl: (7) Failed to connect to launchpad.net port 443: Connection timed out) so I'm going to ask that they be run again. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-18 Thread Robie Basak
Thank you to all involved in the discussion and analysis for carefully considering the regression risk there. Regardless of the final decision, I think the thoughtful consideration makes this an exemplary SRU. I confirmed that the new upload is simply a straightforward review on top of the

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-10 Thread Dan Streetman
** Changed in: openssl (Ubuntu) Assignee: Nicolas Bock (nicolasbock) => (unassigned) ** Changed in: openssl (Ubuntu Bionic) Assignee: Nicolas Bock (nicolasbock) => Bruce Elrick (virtuous-sloth) ** Changed in: openssl (Ubuntu Bionic) Status: Fix Committed => In Progress ** Tags

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-09 Thread Bruce Elrick
Please note the manual testing using the trace option shows the same results. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can send a non-empty status_request in a

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-09 Thread Bruce Elrick
Attach debdiff relative to 18.04.17: openssl (1.1.1-1ubuntu2.1~18.04.17ubuntu1) bionic; urgency=medium * Backport pr9780: - d/p/pr9780_0001-Don-t-send-a-status_request-extension-in-a-Certifica.patch - d/p/pr9780_0002-Teach-TLSProxy-how-to-parse-CertificateRequest-messa.patch -- Bruce

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-09 Thread Bruce Elrick
Thanks for the update, Marc. I will work on producing the dsc against 1.1.1-1ubuntu2.1~18.04.17. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can send a non-empty

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-05-04 Thread Marc Deslauriers
Unfortunately the package in bionic-proposed got superseded by a security update and will need to be re-uploaded. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-04-29 Thread Bruce Elrick
I re-ran the test as follows to actually test the server side with only the packaged executables. I used this command for the server side: /usr/bin/openssl s_server -key key.pem -cert cert.pem -status_file openssl-1.1.1/test/recipes/ocsp-response.der -Verify 5 with ldd showing it loading its

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-04-29 Thread Bruce Elrick
The user who discovered this bug using the golang TLS implementation will be testing the proposed package within the week. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-04-28 Thread Bruce Elrick
I should add, the results in comment 22 indicate that the fix is active and working. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can send a non-empty status_request

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-04-28 Thread Bruce Elrick
I pulled the proposed source: $ pull-lp-source openssl bionic built with tracing enabled: $ cd openssl-1.1.1 $ sed -i -e '/^CONFARGS =/a CONFARGS += enable-ssl-trace' debian/rules $ debuild -us -uc -b 2>&1 | tee ../debuild.log $ cd .. installed: $ sudo dpkg -i

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-04-28 Thread Ɓukasz Zemczak
Per comments from Marc, let's proceed without making this fix optional. Let's just keep our eyes and ears open for any possible regressions caused by this change landing in bionic. ** Changed in: openssl (Ubuntu Bionic) Status: New => Fix Committed ** Tags added: verification-needed

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Bruce Elrick
Marc, I lean your way in terms of my feel for the likelihood that someone is relying on incorrect behaviour in bionic/openssl-1.1.1. I can say that while the lp1940141* patches rely on the pr9780 ones, the reverse is absolutely not the case and thus the lp1940141 ones could be dropped as a whole

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Bruce Elrick
Good point, Dan. A caveat to my work here on this patch: I did some C programming and played with the Perl test harness in the early 90s which gave me enough abililty to develop this patch set but I would benefit from any deeper knowledge someone else may have, especially anyone with openssl

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Dan Streetman
uploaded to bionic queue, thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can send a non-empty status_request in a CertificateRequest To manage notifications

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Dan Streetman
If you'd rather remove the opt-in part, that's fine with me; I can sponsor the debdiff then with the opt-in parts left out, if that works for you Bruce and Nicolas. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Marc Deslauriers
ACK on the two PR9780* patches, but I must say I'm a bit uncomfortable making a bug fix optional (which is what is done in the lp1940141* patches). While it does change what is returned to the client, that part shouldn't be there in the first place. While it's nice to be overly cautious, we don't

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Dan Streetman
@ubuntu-security since this is openssl, could you give the debdiff a review? I can sponsor it as a normal SRU if you have no objections (and the changes look ok to you), as it doesn't really seem like it would specifically need to go to the -security pocket. -- You received this bug notification

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Dan Streetman
> It's not needed for actual functionality of the backport but that assumes that any future backports or fixes don't break this backport yes i get that, my comment is about whether or not the patch changes any code *outside* of the self-tests, e.g. the TLSProxy perl code changes. If that's *only*

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Bruce Elrick
It's not needed for actual functionality of the backport but that assumes that any future backports or fixes don't break this backport. By adding the tests (and wrapping the one test that fails when the backport-enabling environment variable is not set with the enabling of that environmetn

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Bruce Elrick
"variable, we" -> "variable) we" "and future" -> "any future" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can send a non-empty status_request in a

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-23 Thread Dan Streetman
The 2nd upstream patch appears to add new functionality, for actually parsing a certificate request; is that actually needed (outside of the self-tests)? If not, it shouldn't be included in the backport. -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-18 Thread Bruce Elrick
Hey Dan Streetman (ddstreet), I believe the above patch satisfies your valid concerns about backporting. Would you please analyse for acceptance? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-18 Thread Bruce Elrick
openssl (1.1.1-1ubuntu2.1~18.04.15ubuntu1) bionic; urgency=medium * Backport pr9780 but make it optional: - d/p/pr9780_0002-Teach-TLSProxy-how-to-parse-CertificateRequest-messa.patch - d/p/pr9780_0001-Don-t-send-a-status_request-extension-in-a-Certifica.patch -

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2022-03-17 Thread Bruce Elrick
For posterity, here is an example of the relevant part of the client trace output when the bug is active, i.e. data is sent with the ClientRequest: $ grep -B1 -A4 CertificateRequest s_client.log Inner Content Type = Handshake (22) CertificateRequest, Length=1570 request_context

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-11-03 Thread Dan Streetman
> the additional information contains valid data. then I think SRU'ing this would cause a behavior change that could possibly break someone, which isn't something we should do. I'd suggest putting the fix behind some opt-in mechanism, so anyone who is affected can opt-in to the fixed behavior,

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-11-01 Thread Nicolas Bock
Hi Dan, Before the upstream openssl fix [1] the behavior was to send a proper CertificateStatus if the client requested the status_request extension from the server in a CertificateRequest. In other words, the additional information contains valid data. [1]

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-10-01 Thread Dan Streetman
for later reference, i'd discussed this with nick and asked him to check if the 'status_request' reply contained any kind of valid data in the specific cases where this patch will disable it; my concern is if there is valid data in it, it's possible there are applications out there that might

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-09-12 Thread Nicolas Bock
** Description changed: [Impact] openssl does not conform to RFC8446, Sec. 4.4.2.1., by sending a CertificateRequest message to the client with a non-empty status_request extension. This issue was fixed in openssl-1.1.1d and is included in Focal onward. Upstream issue is

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-08-19 Thread Nicolas Bock
** Description changed: [Impact] openssl does not conform to RFC8446, Sec. 4.4.2.1., by sending a CertificateRequest message to the client with a non-empty status_request extension. This issue was fixed in openssl-1.1.1d and is included in Focal onward. Upstream issue is

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-08-18 Thread Mathew Hodson
** Changed in: openssl (Ubuntu) Importance: Undecided => Medium ** Changed in: openssl (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: openssl (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-08-16 Thread Ubuntu Foundations Team Bug Bot
The attachment "bionic.debdiff" seems to be a debdiff. The ubuntu- sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. If the attachment isn't a patch, please remove the "patch" flag from the attachment, remove the "patch" tag, and if

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-08-16 Thread Nicolas Bock
Test package at https://launchpad.net/~nicolasbock/+archive/ubuntu/sf00317240 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940141 Title: OpenSSL servers can send a non-empty status_request in a

[Bug 1940141] Re: OpenSSL servers can send a non-empty status_request in a CertificateRequest

2021-08-16 Thread Nicolas Bock
** Patch added: "bionic.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940141/+attachment/5518220/+files/bionic.debdiff ** Changed in: openssl (Ubuntu) Assignee: (unassigned) => Nicolas Bock (nicolasbock) ** Changed in: openssl (Ubuntu Bionic) Assignee: