If SSL_CTX_set_security_level() is used with a level >= 3 in a client application the initial handshake fails with "no ciphers available". I have been able to reproduce the issue with a raw checkout of the OpenSSL_1_1_1 git tag. The problem doesn't appear with the OpenSSL_1_1_1a tag. To test you can apply this patch to s_client: --- a/apps/s_client.c +++ b/apps/s_client.c @@ -1749,6 +1749,8 @@ int s_client_main(int argc, char **argv) SSL_CTX_set_default_read_buffer_len(ctx, read_buf_len); } + SSL_CTX_set_security_level(ctx, 3); + if (maxfraglen > 0 && !SSL_CTX_set_tlsext_max_fragment_length(ctx, maxfraglen)) { BIO_printf(bio_err,
openssl-1.1.1a-1.fc29 has been submitted as an update to Fedora 29. https://bodhi.fedoraproject.org/updates/FEDORA-2019-a8ffcff7ee
openssl-1.1.1a-1.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report.