Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

[Bug 201446] Server name indication (sni) is not supported in base

0 views
Skip to first unread message

bugzilla...@freebsd.org

unread,
Jul 13, 2015, 2:32:48 PM7/13/15
to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

Xin LI <del...@FreeBSD.org> changed:

What |Removed |Added
----------------------------------------------------------------------------
Status|Closed |Open
Assignee|del...@FreeBSD.org |apa...@FreeBSD.org
Resolution|Overcome By Events |---

--- Comment #8 from Xin LI <del...@FreeBSD.org> ---
Assigning to Apache maintainers for further investigation.

FWIW my nginx SNI worked just fine on 10.1-RELEASE with OpenSSL 1.0.1l.

--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
freebsd-...@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-securi...@freebsd.org"

bugzilla...@freebsd.org

unread,
Jul 13, 2015, 2:41:38 PM7/13/15
to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

Mark Felder <fe...@FreeBSD.org> changed:

What |Removed |Added
----------------------------------------------------------------------------
CC| |fe...@FreeBSD.org

--- Comment #9 from Mark Felder <fe...@FreeBSD.org> ---
My site is also using SNI and 10.1-RELEASE, but with nginx

bugzilla...@freebsd.org

unread,
Dec 12, 2015, 4:03:03 PM12/12/15
to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

Gea-Suan Lin <darkk...@gmail.com> changed:

What |Removed |Added
----------------------------------------------------------------------------
CC| |darkk...@gmail.com

--- Comment #10 from Gea-Suan Lin <darkk...@gmail.com> ---
This bug affects curl too, not just openssl cli itself.

gslin@FreeBSD [~] [02:22] uname -a
FreeBSD FreeBSD.cs.nctu.edu.tw 9.3-RELEASE-p30 FreeBSD 9.3-RELEASE-p30 #0: Mon
Nov 2 10:11:50 UTC 2015
ro...@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64

gslin@FreeBSD [~] [02:22] curl -v https://i.kfs.io/robots.txt
* Trying 118.214.255.182...
* Connected to i.kfs.io (118.214.255.182) port 443 (#0)
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /usr/local/share/certs/ca-root-nss.crt
CApath: none
* TLSv1.0 (OUT), TLS handshake, Client hello (1):
* TLSv1.0 (IN), TLS handshake, Server hello (2):
* TLSv1.0 (IN), TLS handshake, Certificate (11):
* TLSv1.0 (OUT), TLS alert, Server hello (2):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: http://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.

--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
freebsd-...@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security

bugzilla...@freebsd.org

unread,
Nov 5, 2017, 8:31:50 AM11/5/17
to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

Bernard Spil <br...@freebsd.org> changed:

What |Removed |Added
----------------------------------------------------------------------------
CC| |br...@freebsd.org
Status|Open |In Progress

--- Comment #11 from Bernard Spil <br...@freebsd.org> ---
Is this bug still relevant? Meanwhile 9.3 has been EoL for a while and I can't
reproduce.

$ uname -a
FreeBSD gw.example.org 10.1-RELEASE-p6 FreeBSD 10.1-RELEASE-p6 #0: Sun Mar 15
14:00:33 CET 2015 ro...@gw.example.org:/usr/obj/usr/src/sys/EXAMPLE101 i386
$ openssl version
OpenSSL 1.0.1l-freebsd 15 Jan 2015

Tested against an OpenSSL 2.4.29 using SNI I get the correct cert response.

bugzilla...@freebsd.org

unread,
Nov 5, 2017, 4:29:59 PM11/5/17
to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

--- Comment #12 from Benjamin Kaduk <b...@FreeBSD.org> ---
(In reply to Bernard Spil from comment #11)

> Tested against an OpenSSL 2.4.29 using SNI I get the correct cert response.

Surely this is an Apache 2.4.29, not OpenSSL.

bugzilla...@freebsd.org

unread,
Mar 25, 2018, 2:48:35 PM3/25/18
to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

Jochen Neumeister <jon...@FreeBSD.org> changed:

What |Removed |Added
----------------------------------------------------------------------------
Status|In Progress |Closed
Resolution|--- |FIXED
CC| |jon...@FreeBSD.org

--- Comment #13 from Jochen Neumeister <jon...@FreeBSD.org> ---
I close here. Please reopen if the problem is still there
0 new messages