Bug#959469: openssl 1.1.1n-0+deb10u1 flagged for acceptance
On Mon, 2022-03-21 at 00:12 +0100, Sebastian Andrzej Siewior wrote:
> The change in openssl is commit
> cc7c6eb8135b ("Check that the default signature type is allowed")
>
> Before the commit in question it connects as:
> - Description: (TLS1.0)-(ECDHE-SECP384R1)-(AES-256-CBC)-(SHA1)
>
> after that, the server throws:
> 140490373015360:error:14201044:SSL
> routines:tls_choose_sigalg:internal error:../ssl/t1_lib.c:2880:
>
> and it appears that the security level in openssl forbids SHA1 here.
> The argument on the s_server side
> -sigalgs RSA+SHA1:RSA+SHA256:DSA+SHA1:DSA+SHA256
>
> doesn't help here but
> -cipher "ALL:@SECLEVEL=1"
>
> does.
>
If we wanted to add a note to the release announcement in case users
face similar issue with other software, is "tls_choose:sigalg:internal
error" a reliable signal of this situation occurring? Should the
recommended solution be to lower the security level, or might
specifying -sigalgs work on its own in some scenarios?
Regards,
Adam
Reply to: