Bug 1164328
| Summary: | svn & gnutls not working as expected with sha2 certificate | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | jstephen |
| Component: | gnutls | Assignee: | Nikos Mavrogiannopoulos <nmavrogi> |
| Status: | CLOSED NOTABUG | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 6.4 | CC: | jstephen |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2014-11-20 15:26:31 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
jstephen
2014-11-14 16:49:19 UTC
SHA2 is a large family of algorithms. Which algorithm does not work in that case? The site referenced in the report is not public so its certificate is not available. The debian report mentions that SHA1 and SHA2-256 works. Does SHA2-256 work in that case too? I attempted to validate the report in RHEL-6.6, but I couldn't. As far as I see SHA256 certificates are supported in that version. Please provide more information if that is really an issue in the gnutls component or I'll close it as not a bug. # gnutls-cli --version gnutls-cli (GnuTLS) 2.8.5 # gnutls-cli www.sha2sslchecker.com --x509cafile /etc/pki/tls/certs/ca-bundle.crt - Got a certificate list of 4 certificates. - Certificate[0] info: - subject `OU=Domain Control Validated,OU=PositiveSSL,CN=www.sha2sslchecker.com', issuer `C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA Limited,CN=COMODO RSA Domain Validation Secure Server CA', RSA key 2048 bits, signed using RSA-SHA256, activated `2014-09-23 00:00:00 UTC', expires `2015-09-23 23:59:59 UTC', SHA-1 fingerprint `17930cb187632fb189b87e58b6b5792c6214650e' - Certificate[1] info: - subject `C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA Limited,CN=COMODO RSA Domain Validation Secure Server CA', issuer `C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA Limited,CN=COMODO RSA Certification Authority', RSA key 2048 bits, signed using RSA-SHA384, activated `2014-02-12 00:00:00 UTC', expires `2029-02-11 23:59:59 UTC', SHA-1 fingerprint `339cdd57cfd5b141169b615ff31428782d1da639' - Certificate[2] info: - subject `C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA Limited,CN=COMODO RSA Certification Authority', issuer `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', RSA key 4096 bits, signed using RSA-SHA384, activated `2000-05-30 10:48:38 UTC', expires `2020-05-30 10:48:38 UTC', SHA-1 fingerprint `f5ad0bcc1ad56cd150725b1c866c30ad92ef21b0' - Certificate[3] info: - subject `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', issuer `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', RSA key 2048 bits, signed using RSA-SHA, activated `2000-05-30 10:48:38 UTC', expires `2020-05-30 10:48:38 UTC', SHA-1 fingerprint `02faf3e291435468607857694df5e45b68851868' - The hostname in the certificate matches 'www.sha2sslchecker.com'. - Peer's certificate is trusted His issue is not SHA256, but the fact that the server is misconfigured. The certificate list sent by the server isn't ordered. TLS servers must send their certificates in an order that each certificate certifies the next [0]. GnuTLS in RHEL-7 automatically reorders since this proved to be a very common misconfiguration and that's the reason it works. [0]. see http://tools.ietf.org/html/rfc5246#section-7.4.2 " The sender's certificate MUST come first in the list. Each following certificate MUST directly certify the one preceding it." The list of certificates on the server need to be reordered to 0, 3, 2, 1. - Certificate[0] info: - subject `C=US,2.5.4.17=#13053835373231,ST=Arizona,L=Tucson,STREET=1077 N Highland Ave,STREET=Computer Center,O=The University of Arizona,OU=UITS,CN=subversion.uits.arizona.edu', issuer `C=US,ST=MI,L=Ann Arbor,O=Internet2,OU=InCommon,CN=InCommon RSA Server CA', RSA key 2048 bits, signed using RSA-SHA256, activated `2014-11-05 00:00:00 UTC', expires `2017-11-04 23:59:59 UTC', SHA-1 fingerprint `d52a4d1904d72fc17ecea0dd3e7d7588a90fd571' - Certificate[1] info: - subject `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', issuer `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', RSA key 2048 bits, signed using RSA-SHA, activated `2000-05-30 10:48:38 UTC', expires `2020-05-30 10:48:38 UTC', SHA-1 fingerprint `02faf3e291435468607857694df5e45b68851868' - Certificate[2] info: - subject `C=US,ST=New Jersey,L=Jersey City,O=The USERTRUST Network,CN=USERTrust RSA Certification Authority', issuer `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', RSA key 4096 bits, signed using RSA-SHA384, activated `2000-05-30 10:48:38 UTC', expires `2020-05-30 10:48:38 UTC', SHA-1 fingerprint `eab040689a0d805b5d6fd654fc168cff00b78be3' - Certificate[3] info: - subject `C=US,ST=MI,L=Ann Arbor,O=Internet2,OU=InCommon,CN=InCommon RSA Server CA', issuer `C=US,ST=New Jersey,L=Jersey City,O=The USERTRUST Network,CN=USERTrust RSA Certification Authority', RSA key 2048 bits, signed using RSA-SHA384, activated `2014-10-06 00:00:00 UTC', expires `2024-10-05 23:59:59 UTC', SHA-1 fingerprint `f5fb01dea6e59ca6dd057054f4a3ff72dde1d5c6' |