** Description changed:

- 
  [Impact]
  
-  * TLSv1.3 (which is enabled by default) connections are getting killed
+  * TLSv1.3 (which is enabled by default) connections are getting killed
  instead of succeeding negotiation.
  
  [Test Case]
  
-  * Create lighttpd server, attempt to connect via tlsv1.3
-  * Connection should succeed.
+  * Create lighttpd server, attempt to connect via tlsv1.3
+  * Connection should succeed.
+ 
+ Sample lighttpd.conf:
+ 
+ server.port = 443
+ ssl.engine = "enable"
+ ssl.pemfile = "/etc/lighttpd/server.pem"
+ 
+ Where server.pem is concat of snakeoil cert + private key.
+ 
+ Attempting curl to lighttpd results in:
+ 
+ # curl --cacert /etc/ssl/certs/ssl-cert-snakeoil.pem https://apt-kitten.lxd
+ curl: (52) Empty reply from server
+ 
+ # grep 'killing' /var/log/lighttpd/error.log 
+ 2019-06-25 09:40:15: (connections-glue.c.126) SSL: renegotiation initiated by 
client, killing connection 
+ 
  
  [Regression Potential]
  
-  * TLSv1.3 connections attempt client renegotiation when they should
+  * TLSv1.3 connections attempt client renegotiation when they should
  not, as that's not supported anymore. Currently, connections are getting
  killed instead of succeeding. This change is a backport from a later
  v1.4 series point release, hence the file paths don't match the original
  and variables are renamed, however, the affected codepath appears to
  still be the same-ish. Hence the patch should be review for rebase
  correctness as there is room for error in handling client renegotiation
  with prior tls versions.
  
  [Upstream Link]
  
https://redmine.lighttpd.net/projects/lighttpd/repository/revisions/7a7f4f987aa8443aa3898f484539f707e213bcba/diff
  
  [Original Bugreport]
  
  After installing today's bionic OpenSSL update (1.1.0g-2ubuntu4.3 ->
  1.1.1-1ubuntu2.1~18.04.1 and associated libraries) SSL is broken in
  lighttpd 1.4.45-1ubuntu3.  The logs are full of messages of the form:
  
  2019-06-11 12:02:20: (connections-glue.c.126) SSL: renegotiation
  initiated by client, killing connection
  
  Perhaps problem with TLS v1.3 negotiation?  (And the version of lighttpd
  is too old to have the ssl.openssl.ssl-conf-cmd directive to try to
  disable it.)
  
  Description:  Ubuntu 18.04.2 LTS
  Release:      18.04
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: lighttpd 1.4.45-1ubuntu3
  ProcVersionSignature: Ubuntu 4.15.0-51.55-generic 4.15.18
  Uname: Linux 4.15.0-51-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.6
  Architecture: amd64
  Date: Tue Jun 11 14:18:55 2019
  SourcePackage: lighttpd
  UpgradeStatus: Upgraded to bionic on 2018-06-10 (365 days ago)
  modified.conffile..etc.lighttpd.conf-available.10-cgi.conf: [modified]
  modified.conffile..etc.lighttpd.lighttpd.conf: [modified]
  mtime.conffile..etc.lighttpd.conf-available.10-cgi.conf: 
2015-07-16T10:18:19.857892
  mtime.conffile..etc.lighttpd.lighttpd.conf: 2019-06-11T12:01:59.493213

** Description changed:

  [Impact]
  
   * TLSv1.3 (which is enabled by default) connections are getting killed
  instead of succeeding negotiation.
  
  [Test Case]
  
   * Create lighttpd server, attempt to connect via tlsv1.3
   * Connection should succeed.
  
  Sample lighttpd.conf:
  
  server.port = 443
  ssl.engine = "enable"
  ssl.pemfile = "/etc/lighttpd/server.pem"
  
  Where server.pem is concat of snakeoil cert + private key.
  
  Attempting curl to lighttpd results in:
  
  # curl --cacert /etc/ssl/certs/ssl-cert-snakeoil.pem https://apt-kitten.lxd
  curl: (52) Empty reply from server
  
- # grep 'killing' /var/log/lighttpd/error.log 
- 2019-06-25 09:40:15: (connections-glue.c.126) SSL: renegotiation initiated by 
client, killing connection 
+ # grep 'killing' /var/log/lighttpd/error.log
+ 2019-06-25 09:40:15: (connections-glue.c.126) SSL: renegotiation initiated by 
client, killing connection
  
+ Upgrade to new lighttpd, repeat curl, and now get the download of the
+ home-page:
+ 
+ # curl --cacert /etc/ssl/certs/ssl-cert-snakeoil.pem https://apt-kitten.lxd
+ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
+ <html xmlns="http://www.w3.org/1999/xhtml";>
+ <head>
+ ...
  
  [Regression Potential]
  
   * TLSv1.3 connections attempt client renegotiation when they should
  not, as that's not supported anymore. Currently, connections are getting
  killed instead of succeeding. This change is a backport from a later
  v1.4 series point release, hence the file paths don't match the original
  and variables are renamed, however, the affected codepath appears to
  still be the same-ish. Hence the patch should be review for rebase
  correctness as there is room for error in handling client renegotiation
  with prior tls versions.
  
  [Upstream Link]
  
https://redmine.lighttpd.net/projects/lighttpd/repository/revisions/7a7f4f987aa8443aa3898f484539f707e213bcba/diff
  
  [Original Bugreport]
  
  After installing today's bionic OpenSSL update (1.1.0g-2ubuntu4.3 ->
  1.1.1-1ubuntu2.1~18.04.1 and associated libraries) SSL is broken in
  lighttpd 1.4.45-1ubuntu3.  The logs are full of messages of the form:
  
  2019-06-11 12:02:20: (connections-glue.c.126) SSL: renegotiation
  initiated by client, killing connection
  
  Perhaps problem with TLS v1.3 negotiation?  (And the version of lighttpd
  is too old to have the ssl.openssl.ssl-conf-cmd directive to try to
  disable it.)
  
  Description:  Ubuntu 18.04.2 LTS
  Release:      18.04
  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: lighttpd 1.4.45-1ubuntu3
  ProcVersionSignature: Ubuntu 4.15.0-51.55-generic 4.15.18
  Uname: Linux 4.15.0-51-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.6
  Architecture: amd64
  Date: Tue Jun 11 14:18:55 2019
  SourcePackage: lighttpd
  UpgradeStatus: Upgraded to bionic on 2018-06-10 (365 days ago)
  modified.conffile..etc.lighttpd.conf-available.10-cgi.conf: [modified]
  modified.conffile..etc.lighttpd.lighttpd.conf: [modified]
  mtime.conffile..etc.lighttpd.conf-available.10-cgi.conf: 
2015-07-16T10:18:19.857892
  mtime.conffile..etc.lighttpd.lighttpd.conf: 2019-06-11T12:01:59.493213

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832295

Title:
  lighttpd broken by OpenSSL update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lighttpd/+bug/1832295/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to