[Webkit-unassigned] [Bug 202156] [GTK] Unable to load page due to TLS errors

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Wed Sep 25 03:44:19 PDT 2019


https://bugs.webkit.org/show_bug.cgi?id=202156

Carlos Alberto Lopez Perez <clopez at igalia.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |clopez at igalia.com

--- Comment #1 from Carlos Alberto Lopez Perez <clopez at igalia.com> ---
That website has very insecure TLS settings.
Firefox shows a warning, but connects fine. Chrome connects without showing any warning (I'm surprised about that)

This is what the site provides:

$ nmap --script ssl-enum-ciphers -p 443 clientes.tautoradio.com
Starting Nmap 7.70 ( https://nmap.org ) at 2019-09-25 12:38 CEST
Nmap scan report for clientes.tautoradio.com (91.117.124.94)
Host is up (0.0085s latency).
rDNS record for 91.117.124.94: 94.124.117.91.static.reverse-mundo-r.com

PORT    STATE SERVICE
443/tcp open  https
| ssl-enum-ciphers: 
|   SSLv3: 
|     ciphers: 
|       TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
|       TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
|       TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|       TLS_RSA_WITH_DES_CBC_SHA (rsa 2048) - C
|       TLS_RSA_EXPORT1024_WITH_RC4_56_SHA - D
|       TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA - D
|       TLS_RSA_EXPORT_WITH_RC4_40_MD5 - E
|       TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - E
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       64-bit block cipher 3DES vulnerable to SWEET32 attack
|       64-bit block cipher DES vulnerable to SWEET32 attack
|       64-bit block cipher RC2 vulnerable to SWEET32 attack
|       Broken cipher RC4 is deprecated by RFC 7465
|       CBC-mode cipher in SSLv3 (CVE-2014-3566)
|       Ciphersuite uses MD5 for message integrity
|   TLSv1.0: 
|     ciphers: 
|       TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
|       TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
|       TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|       TLS_RSA_WITH_DES_CBC_SHA (rsa 2048) - C
|       TLS_RSA_EXPORT1024_WITH_RC4_56_SHA - D
|       TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA - D
|       TLS_RSA_EXPORT_WITH_RC4_40_MD5 - E
|       TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - E
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       64-bit block cipher 3DES vulnerable to SWEET32 attack
|       64-bit block cipher DES vulnerable to SWEET32 attack
|       64-bit block cipher RC2 vulnerable to SWEET32 attack
|       Broken cipher RC4 is deprecated by RFC 7465
|       Ciphersuite uses MD5 for message integrity
|_  least strength: E

Nmap done: 1 IP address (1 host up) scanned in 1.27 seconds


So basically: TLS-1.0 and SSLv3 with weak ciphers (3DES/DES/RC2)

On a modern distro (Debian 10) All the tools I tried refuse to connect with that site due to that insecure settings.

To enumerate them:

$ curl https://clientes.tautoradio.com
curl: (35) OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to clientes.tautoradio.com:443 

$ wget https://clientes.tautoradio.com
--2019-09-25 12:40:55--  https://clientes.tautoradio.com/
Resolving clientes.tautoradio.com (clientes.tautoradio.com)... 91.117.124.94
Connecting to clientes.tautoradio.com (clientes.tautoradio.com)|91.117.124.94|:443... connected.
GnuTLS: The TLS connection was non-properly terminated.
Unable to establish SSL connection.

$ gnutls-cli -p 443 clientes.tautoradio.com
Processed 124 CA certificate(s).
Resolving 'clientes.tautoradio.com:443'...
Connecting to '91.117.124.94:443'...
*** Fatal error: The TLS connection was non-properly terminated.


$ openssl s_client -CApath /etc/ssl/certs/ -showcerts -connect clientes.tautoradio.com:443
CONNECTED(00000003)
write:errno=0
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 325 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---


However on an old version of Debian (Debian 8) the tools work because Debian 8 was released years ago when such TLS setting were still considered acceptable



This is what gnutls-cli and openssl s_client say about that site when ran from Debian 8:


$ gnutls-cli -p 443 clientes.tautoradio.com
Processed 152 CA certificate(s).
Resolving 'clientes.tautoradio.com'...
Connecting to '91.117.124.94:443'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.
- Certificate[0] info:
 - subject `L=CORUÑA (A),serialNumber=A15080773,OU=SISTEMAS,O=TRANSPORTES AUTO-RADIO S.A.,CN=*.tautoradio.com,C=ES', issuer `C=ES,OU=AC CAMERFIRMA,O=AC Camerfirma S.A.,serialNumber=A82743287,L=Madrid (see current address at https://www.camerfirma.com/address),CN=Camerfirma Corporate Server II - 2015', RSA key 2048 bits, signed using RSA-SHA256, activated `2018-12-27 13:55:18 UTC', expires `2019-12-27 13:55:18 UTC', SHA-1 fingerprint `4c5dbce981e460303b2f7050da2dd7903f37d039'
        Public Key ID:
                47566945cd16d0e43840bf65a5eeb98a21164291
        Public key's random art:
                +--[ RSA 2048]----+
                |      ..  .o.=*=o|
                |      E.   .= oo=|
                |      .   o. +.= |
                |     .   o   .=  |
                |      . S .  ..  |
                |       . o   . . |
                |        o .   o  |
                |       . . o   . |
                |          . ...  |
                +-----------------+

- Certificate[1] info:
 - subject `C=ES,OU=AC CAMERFIRMA,O=AC Camerfirma S.A.,serialNumber=A82743287,L=Madrid (see current address at https://www.camerfirma.com/address),CN=Camerfirma Corporate Server II - 2015', issuer `C=EU,L=Madrid (see current address at www.camerfirma.com/address),serialNumber=A82743287,O=AC Camerfirma S.A.,CN=Chambers of Commerce Root - 2008', RSA key 4096 bits, signed using RSA-SHA256, activated `2015-01-15 09:21:16 UTC', expires `2037-12-15 09:21:16 UTC', SHA-1 fingerprint `fe727a78ea0c0335cdda9c2ed75fd4d46f35c2ef'
- Status: The certificate is trusted. 
- Description: (TLS1.0)-(RSA)-(3DES-CBC)-(SHA1)
- Session ID: 8A:18:00:00:8C:47:2B:53:AB:99:85:DF:40:07:CE:14:15:D7:EA:15:A1:04:55:30:4B:04:2A:39:6E:2A:DB:88
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: 3DES-CBC
- MAC: SHA1
- Compression: NULL
- Options: safe renegotiation,
- Handshake was completed

- Simple Client Mode:


$ openssl s_client -CApath /etc/ssl/certs/ -connect clientes.tautoradio.com:443
CONNECTED(00000003)
depth=2 C = EU, L = Madrid (see current address at www.camerfirma.com/address), serialNumber = A82743287, O = AC Camerfirma S.A., CN = Chambers of Commerce Root - 2008
verify return:1
depth=1 C = ES, OU = AC CAMERFIRMA, O = AC Camerfirma S.A., serialNumber = A82743287, L = Madrid (see current address at https://www.camerfirma.com/address), CN = Camerfirma Corporate Server II - 2015
verify return:1
depth=0 L = CORU\C3\91A (A), serialNumber = A15080773, OU = SISTEMAS, O = TRANSPORTES AUTO-RADIO S.A., CN = *.tautoradio.com, C = ES
verify return:1
---
Certificate chain
 0 s:/L=CORU\xC3\x91A (A)/serialNumber=A15080773/OU=SISTEMAS/O=TRANSPORTES AUTO-RADIO S.A./CN=*.tautoradio.com/C=ES
   i:/C=ES/OU=AC CAMERFIRMA/O=AC Camerfirma S.A./serialNumber=A82743287/L=Madrid (see current address at https://www.camerfirma.com/address)/CN=Camerfirma Corporate Server II - 2015
 1 s:/C=ES/OU=AC CAMERFIRMA/O=AC Camerfirma S.A./serialNumber=A82743287/L=Madrid (see current address at https://www.camerfirma.com/address)/CN=Camerfirma Corporate Server II - 2015
   i:/C=EU/L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287/O=AC Camerfirma S.A./CN=Chambers of Commerce Root - 2008
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/L=CORU\xC3\x91A (A)/serialNumber=A15080773/OU=SISTEMAS/O=TRANSPORTES AUTO-RADIO S.A./CN=*.tautoradio.com/C=ES
issuer=/C=ES/OU=AC CAMERFIRMA/O=AC Camerfirma S.A./serialNumber=A82743287/L=Madrid (see current address at https://www.camerfirma.com/address)/CN=Camerfirma Corporate Server II - 2015
---
No client certificate CA names sent
---
SSL handshake has read 4567 bytes and written 599 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-MD5
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : RC4-MD5
    Session-ID: FE160000438F54E0E2E501B145C749FB9E9414682855C2252F8C0DA976A471A0
    Session-ID-ctx: 
    Master-Key: 178A30C532D2D5AC313EB91DE446A4D14DB94DE00366C22B9C01C830174CB7BCBA7AD33ECE53E55571B490C220873FB6
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1569408199
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20190925/3cccdaa5/attachment-0001.html>


More information about the webkit-unassigned mailing list