> On Jun 13, 2015, at 4:00 PM, Joel Sing <j...@sing.id.au> wrote:
> 
> On Tuesday 09 June 2015, Alexey Ivanov wrote:
>>> On Jun 6, 2015, at 5:31 AM, Joel Sing <j...@sing.id.au> wrote:
>>> 
>>> On Saturday 06 June 2015, 1edhaz+9sj4olxjt6...@guerrillamail.com wrote:
>>>> Hello,
>>>> 
>>>> LibreSSL 2.2 (openbsd-current) fails to connect to
>>>> https://webdav.yandex.com.
>>>> 
>>>> OpenSSL 1.0.1m from OpenBSD packages does succeed.
>>>> 
>>>> Yandex is the largest search engine in Russia. The webdav.yandex.com
>>>> site is for accessing their file-hosting service.
>>>> 
>>>> System info:
>>>> 
>>>> $ uname -a
>>>> OpenBSD roger.my.domain 5.7 GENERIC.MP#1039 amd64
>>>> $ dmesg | head -n 1
>>>> OpenBSD 5.7-current (GENERIC.MP) #1039: Wed Jun  3 12:09:31 MDT 2015
>>> 
>>> [snip]
>>> 
>>> The issue is due to the remote end not being RFC compliant and failing to
>>> complete a TLS handshake when it does not recognise TLS signature
>>> algorithms (sigalgs) that are being advertised by the client. In this
>>> case the new signature algorithms are related to GOST - almost the
>>> definition of irony...
>> 
>> GOST… lol indeed =)
>> 
>>> If you want to verify this for yourself, you can comment out the GOST
>>> related entries in the tls12_sigalgs array in t1_lib.c. HTTPS connections
>>> to www.yandex.com work without issue, so it would seemingly be the
>>> particular HTTP server that is being used for this service - I would
>>> recommend contacting Yandex and reporting the issue to them.
>> 
>> He just did - Yandex is heavy BSD user, so many people there are reading
>> tech@ and freebsd-hackers@. Some brave souls even subscribed to
>> trolls@^Wmisc@!
>> 
>> Back to the problem itself, as far as I know they are aware of it. In the
>> meantime, while they are busy solving it on their side, you may want to
>> limit ciphersuites client is using by calling `SSL_CTX_set_cipher_list`
>> before `SSL_do_handshake`.
> 
> Except that would not have made any difference - currently the list of
> signature algorithms is static and not dependent on the cipher suites
> selected.
You are right indeed, my bad.

The only other quick workaround that I can think of is to use TLS1.1 instead 
(if that’s acceptable from security standpoint):
𝛌 ~ echo -n | /usr/local/Cellar/libressl/2.1.6/bin/openssl s_client -connect 
webdav.yandex.ru:443 -tls1_1 |& fgrep DONE
DONE
> 
>> PS. Anyway, next time you probably want to report libressl-related problems
>> to recently announced libre...@openbsd.org [1].
>> 
>> [1] http://comments.gmane.org/gmane.os.openbsd.tech/42319
> --
> 
>    "Action without study is fatal. Study without action is futile."
>        -- Mary Ritter Beard

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to