CSD scripts do not work on jammy
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openconnect (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
The CSD scripts all use curl to communicate to the ASA server and in Jammy curl has been linked with openssl 3.
openssl 3 switched off SSL_OP_
When run manually curl reports back:
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (OUT), TLS header, Unknown (21):
* TLSv1.2 (OUT), TLS alert, handshake failure (552):
* error:0A000152:SSL routines::unsafe legacy renegotiation disabled
* Closing connection 0
curl: (35) error:0A000152:SSL routines::unsafe legacy renegotiation disabled
My feeling is that curl should set the SSL option when -k is used. openconnect itself sets this option already, it was fixed in commit c8dcf10
ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: openconnect 8.20-1
ProcVersionSign
Uname: Linux 5.15.0-25-generic x86_64
NonfreeKernelMo
ApportVersion: 2.20.11-0ubuntu80
Architecture: amd64
CasperMD5CheckR
CasperVersion: 1.468
CurrentDesktop: ubuntu:GNOME
Date: Sun Apr 10 12:19:57 2022
LiveMediaBuild: Ubuntu 22.04 LTS "Jammy Jellyfish" - Daily amd64 (20220409)
ProcEnviron:
TERM=xterm-
PATH=(custom, no user)
XDG_RUNTIME_
LANG=en_US.UTF-8
SHELL=/bin/bash
SourcePackage: openconnect
UpgradeStatus: No upgrade log present (probably fresh install)
I’m one of the upstream OpenConnect developers. Thanks for bringing this to our attention. This is one of a seemingly-endless stream of issues (e.g. https:/ /gitlab. com/openconnect /openconnect/ -/issues/ 211) that OpenConnect users have encountered as a result of distros’ recent mania for enforcing “minimum TLS security levels” on a system-wide level.
It’s a frustrating situation for OpenConnect because users often have to connect to ancient unpatched VPNs to do their work, can’t do anything about the server configuration, and have no real expectation of “security” anyway.
> My feeling is that curl should set the SSL option when -k is used. openconnect itself sets this option already, it was fixed in commit c8dcf10
If you replace the cURL invocation in the CSD/Trojan script with…
``` CONF=/dev/ null curl <usual options>
OPENSSL_
```
… does this make it work? (For some hints about how/why it should work, start with https:/ /gitlab. com/openconnect /openconnect/ -/commit/ 7e862f2f0352409 357fa7a4762481f de49909eb8# 406e031b8824ea2 6ae0bf4d7579a1d 89e3fb5906)