<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>44991</bug_id>
          
          <creation_ts>2023-01-21 10:44:07 +0300</creation_ts>
          <short_desc>Cоединение только по протоколу TLS 1.3</short_desc>
          <delta_ts>2024-02-21 17:02:39 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>alterator-fbi</component>
          <version>unstable</version>
          <rep_platform>x86_64</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P5</priority>
          <bug_severity>critical</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Andrey Cherepanov">cas</reporter>
          <assigned_to name="manowar@altlinux.org">manowar</assigned_to>
          <cc>imz</cc>
    
    <cc>manowar</cc>
    
    <cc>nbr</cc>
    
    <cc>sem</cc>
    
    <cc>v.karpunin</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>220438</commentid>
    <comment_count>0</comment_count>
    <who name="Andrey Cherepanov">cas</who>
    <bug_when>2023-01-21 10:44:07 +0300</bug_when>
    <thetext>nmap --script ssl-enum-ciphers -p 8080 127.0.0.1
Starting Nmap 7.80 ( https://nmap.org ) at 2023-01-20 17:04 +05
Nmap scan report for localhost.localdomain (127.0.0.1)
Host is up (0.000038s latency).

PORT     STATE SERVICE
8080/tcp open  http-proxy
| ssl-enum-ciphers:
|   TLSv1.0:
|     ciphers:
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: client
|   TLSv1.1:
|     ciphers:
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: client
|   TLSv1.2:
|     ciphers:
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: client
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 0.28 seconds
Конфигов задающих или меняющих это не нашел.

При этом явно указав 1_3, тоже вроде работает

openssl s_client -connect 127.0.0.1:8080  -tls1_3
Надо понять, можно ли сделать 1_3 дефолтным?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>241796</commentid>
    <comment_count>1</comment_count>
    <who name="Владимир">v.karpunin</who>
    <bug_when>2024-02-19 13:59:45 +0300</bug_when>
    <thetext>Добрый день.
Актуально.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>241854</commentid>
    <comment_count>2</comment_count>
    <who name="manowar@altlinux.org">manowar</who>
    <bug_when>2024-02-20 13:07:56 +0300</bug_when>
    <thetext>Насколько я вижу, libvhttpd (который использует ahttpd) линкуется с OpenSSL и при настройке сокета для работы по TLS не использует никаких специальных параметров (кроме сертификата и ключа). Мне кажется, что в первом приближении проблема должна закрываться общесистемным конфигом /etc/openssl/openssl.cnf (и ещё там есть cipher-list.conf).</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>241876</commentid>
    <comment_count>3</comment_count>
    <who name="manowar@altlinux.org">manowar</who>
    <bug_when>2024-02-20 19:17:29 +0300</bug_when>
    <thetext>Чинить сперва будем в Сизифе.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>241877</commentid>
    <comment_count>4</comment_count>
    <who name="manowar@altlinux.org">manowar</who>
    <bug_when>2024-02-20 19:31:37 +0300</bug_when>
    <thetext>https://git.altlinux.org/tasks/341175/
https://git.altlinux.org/tasks/341177/
https://git.altlinux.org/tasks/341178/</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>241914</commentid>
    <comment_count>5</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2024-02-21 17:02:39 +0300</bug_when>
    <thetext>alterator-fbi-5.49.4-alt1 -&gt; sisyphus:

 Tue Feb 20 2024 Paul Wolneykien &lt;manowar@altlinux&gt; 5.49.4-alt1
 - Fixed a typo in the ahttpd.acl.conf(5) manual page.
 - Configure ahttpd to use TLSv1.3 or higher (closes: 44991).</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>