Your comment above omits the interesting parts, since the core problem
is that for TLSv1 and TLSv1.1 the server and client cannot negotiate any
ciphers, thus while connected, the TLS handshake actually fails.

openssl s_client -connect www.taujhe.de:443 -tls1                               
                                                                 
CONNECTED(00000003)
140332462585552:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert 
protocol version:s3_pkt.c:1487:SSL alert number 70
140332462585552:error:1409E0E5:SSL routines:ssl3_write_bytes:ssl handshake 
failure:s3_pkt.c:656:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1
    Cipher    : 0000
    Session-ID: 
    Session-ID-ctx: 
    Master-Key: 
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1477324805
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---

openssl s_client -connect www.taujhe.de:443 -tls1_1
CONNECTED(00000003)
140505464448720:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert 
protocol version:s3_pkt.c:1487:SSL alert number 70
140505464448720:error:1409E0E5:SSL routines:ssl3_write_bytes:ssl handshake 
failure:s3_pkt.c:656:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.1
    Cipher    : 0000
    Session-ID: 
    Session-ID-ctx: 
    Master-Key: 
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1477324781
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---

A working example with TLSv1.2:
openssl s_client -connect www.taujhe.de:443 -tls1_2                             
                                                                 
CONNECTED(00000003)
depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN 
= COMODO RSA Certification Authority
verify return:1
depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN 
= COMODO RSA Domain Validation Secure Server CA
verify return:1
depth=0 OU = Domain Control Validated, OU = PositiveSSL, CN = www.taujhe.de
verify return:1
---
Certificate chain
 0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=www.taujhe.de
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA 
Domain Validation Secure Server CA
 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA 
Domain Validation Secure Server CA
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA 
Certification Authority
 2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA 
Certification Authority
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA 
Certification Authority
---
Server certificate
-----BEGIN CERTIFICATE-----
<removed>
-----END CERTIFICATE-----
subject=/OU=Domain Control Validated/OU=PositiveSSL/CN=www.taujhe.de
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA 
Domain Validation Secure Server CA
---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 5096 bytes and written 434 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: <removed>
    Session-ID-ctx: 
    Master-Key: <removed>
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - 35 71 e2 eb 80 2a 22 97-1b ea 75 54 b1 af ab 06   5q...*"...uT....
    0010 - 7b bc ac 7b ac 12 6a 74-28 56 36 49 6c 92 24 73   {..{..jt(V6Il.$s
    0020 - bb 66 1d 4e 50 58 a7 eb-98 5f e5 59 e7 78 32 72   .f.NPX..._.Y.x2r
    0030 - 40 ff 30 13 33 ef e9 88-ad 1b 83 1a 1c 66 28 b7   @.0.3........f(.
    0040 - ca ed 1a 3f 8f d0 15 65-3e 7d de 86 c1 c2 af 11   ...?...e>}......
    0050 - ef fd aa 7d 5f 0e 53 ad-2e 5f 1c 1a 51 27 ca 67   ...}_.S.._..Q'.g
    0060 - e1 b7 28 a5 4c 47 d8 f3-87 dc e7 f9 cb 9d ae f8   ..(.LG..........
    0070 - 5e 19 60 5f ec e2 ab a5-98 a9 7f 59 1f e9 24 8d   ^.`_.......Y..$.
    0080 - f5 08 26 37 63 05 3d 19-2a cc a5 96 94 c1 66 b4   ..&7c.=.*.....f.
    0090 - 41 5a 2c be 97 e1 9e dd-78 7d 08 ed 7f 82 4d 2f   AZ,.....x}....M/
    00a0 - b5 05 76 d6 41 eb 14 58-1c 9d 67 c9 c4 39 a5 fe   ..v.A..X..g..9..
    00b0 - 0b 72 8b f9 3b b8 83 f8-96 a3 11 c4 0e 03 16 ac   .r..;...........

    Start Time: 1477324808
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---

Apache2 with mod_ssl is actually configured to support TLSv1+ with several 
cipher suites to fit that:
SSLProtocol             all -SSLv3
SSLCipherSuite          
ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
SSLHonorCipherOrder     on
SSLCompression          off
SSLSessionTickets       off

So from my point of view clearly the problem is the lack of ciphers in
the Ubuntu build OpenSSL.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1636124

Title:
  openssl lacks support for TLSv1 and TLSv1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1636124/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to