[u-u] Odds and Ends

Bill Duncan bduncan at beachnet.org
Fri Jul 20 16:57:48 EDT 2018


This is the info I see on there now..

twiggy:~$ openssl s_client -connect unixunanimous.org:443 < /dev/null 2>/dev/null | openssl x509 -noout -subject -issuer -dates -fingerprint -serial
subject= /CN=www2.infra-service.ca
issuer= /C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
notBefore=Jul 13 04:15:42 2018 GMT
notAfter=Oct 11 04:15:42 2018 GMT
SHA1 Fingerprint=C8:7B:57:36:9A:86:BF:42:9A:C3:A1:6A:8B:CA:E1:1C:84:7D:F8:FD
serial=04CB17E5A0D5649B30FB1C6319C3DBEC2FFA


On Fri, Jul 20, 2018 at 04:46:18PM -0400, Dan Astoorian wrote:
> On Fri, 20 Jul 2018 16:19:58 EDT, Unix Unanimous writes:
> > 	Removal os the "s" is not secure ... we added a new
> > 	Let's Encrypt cert recently & even tho cert testers
> > 	seem to like it, browsers often take several clicks
> > 	on "Try Again" to make it work for some reason
> > 
> > 
> > 	Perhaps we will replace the cert soon if further
> > 	debugging doesn't turn up anything, sigh :\
> 
> Not sure how recently "recently" is, but I sent mail about this on June
> 11 to www-uu at unixunanimous.org; I never received a reply (or even
> acknowlegement that the message was received).
> 
> At the time, the certificate on the page had expired on 12/30/2016 (so I
> assume this was before the switch to Let's Encrypt), but
> even ignoring the expiry problem, browsers were intermittently refusing
> to connect, with Firefox reporting
> "SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH" (apparently meaning "SSL
> received an unexpected Server Key Exchange handshake message."), and
> chromium-browser (66.0.3359.170) reporting "ERR_SSL_PROTOCOL_ERROR" with
> the diagnostic "[...:ERROR:ssl_client_socket_impl.cc(1098)] handshake
> failed; returned -1, SSL error code 1, net_error -107".
> 
> So I don't think the problem is the certificate; my guess is that the
> server software has some configuration issues.  Tweaking the available
> protocols and/or cipher suites (SSLProtocol, SSLCipherSuite,
> SSLHonorCipherOrder) might help--perhaps the server is offering ciphers
> that modern software just consider broken.
> 
> Or maybe the NSA's packet sniffer is having trouble interpolating itself
> between the server and its clients transparently :-)
> 
> -- 
> Dan Astoorian, Systems Administrator
> Engineering Computing Facility
> University of Toronto
> _______________________________________________
> u-u mailing list
> u-u at unixunanimous.org
> https://unixunanimous.org/mailman/listinfo/u-u

-- 
Bill Duncan,         | http://billduncan.org/
bduncan at beachnet.org | - linux/unix/network
+1 416 697-9315      | - performance engineering


More information about the u-u mailing list