Bug#706008: iceweasel / nss bug or problem

Daniel Kahn Gillmor dkg at fifthhorseman.net
Tue Apr 23 15:31:37 UTC 2013


On 04/23/2013 09:45 AM, franz schaefer wrote:

> export NSS_ALLOW_WEAK_SIGNATURE_ALG=1 
> 
> it would be good to have an option to allow this on a site by site basis in
> the browser.
> 
> the nss website says the above environment setting does:
> 
>>  Enables the use of MD2 and MD4 inside signatures. This was allowed by
>>  default before NSS 3.12.3.

This is a good change; we should not have been accepting these digests
for the last several years at least.  i'm glad we're not accepting them
for wheezy :)

> when connectiong to the server via:
> 
>  openssl s_client -connect 
> 
> i get:
> 
> New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
> Server public key is 1024 bit
> Secure Renegotiation IS NOT supported
> Compression: NONE
> Expansion: NONE
> SSL-Session:
>     Protocol  : TLSv1
>     Cipher    : DHE-RSA-AES256-SHA
> 
> 
> when i examine the self signed certificate it tells me:
> 
> $ openssl x509 -in q -text | grep Signature
>     Signature Algorithm: md5WithRSAEncryption
>     Signature Algorithm: md5WithRSAEncryption
> 
> so i am not really sure why this is rejected at all. but i thought i share
> the sollution here in case other people have that problem as well.

hm, yeah, this seems like it should have been acceptable if it is a
self-signed cert, given the documentation.  I'm using libnss3 3.14.3
(though with iceweasel 20 from experimental), and i can connect to an
openssl s_server instance running with the attached key+cert combo,
which is also a 1024-bit RSA key signed with md5.

I generated the key and the cert with:

openssl req -new -x509 -newkey rsa:1024 -keyout key -nodes -subj
'/CN=localhost/' -out cert

and i launched s_server with:

openssl s_server -key key -cert cert -cipher DHE-RSA-AES256-SHA

and then pointed my browser at https://localhost:4433/ and accepted the
certificate warning.

Does this not work for you?  would you be willing to share the cert your
device uses?  (you can send it to me privately if you don't want to post
it to the bug log).

Using the patches to nss from http://bugs.debian.org/701141 to include
/usr/bin/tstclnt, i was able to test this connection with:

 certutil -A -d .  -n localhost -t P,P,P < cert
 tstclnt -h 127.0.0.1 -a localhost -p 4433 -d .

and i didn't have a problem connecting.

so i haven't yet replicated the problem you're describing.

	--dkg

-------------- next part --------------
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-------------- next part --------------
Public Key Info:
	Public Key Algorithm: RSA
	Key Security Level: Weak (1024 bits)

modulus:
	00:b1:bc:22:c2:d6:65:21:8a:b9:71:0d:45:d4:0b:
	60:b8:85:76:fd:19:c1:28:82:b7:07:00:29:1a:4a:
	08:a1:ad:3e:e7:40:1e:2e:dc:d1:74:fc:70:32:75:
	c9:8a:13:e3:43:39:4a:22:77:f6:ec:4c:ee:74:34:
	e9:0e:78:a0:7e:d5:db:09:8d:49:bd:05:2f:ca:92:
	a7:9d:4b:1b:20:3a:f3:f3:20:6e:d8:d5:64:b9:f5:
	87:4d:54:44:b5:77:c1:58:65:36:ec:47:71:18:36:
	9d:58:3f:d6:af:a6:35:b6:ef:ea:be:9a:cd:5a:99:
	56:57:b9:c1:e2:29:e5:64:2f:

public exponent:
	01:00:01:

private exponent:
	2f:15:da:57:a7:98:af:24:23:30:92:05:97:c1:53:
	e4:4e:67:51:72:0b:3c:02:35:1e:c3:aa:1f:ee:d1:
	0e:93:e9:00:36:7a:48:8b:f3:69:7c:9e:f4:9f:43:
	bf:32:b9:98:4b:8b:1a:4a:91:bd:d4:3b:af:c9:7c:
	9c:7a:d4:79:94:7c:69:fc:66:e1:9f:20:2e:ed:4a:
	31:74:11:fc:b5:1a:c3:6d:91:a2:91:64:f4:c7:e5:
	b7:ea:e3:52:91:61:4a:a1:18:41:3a:b2:8c:0e:9b:
	04:6c:44:bd:db:1c:f8:71:4e:d4:a6:a9:05:ce:19:
	4c:0f:77:0a:51:5f:21:61:

prime1:
	00:d0:2c:bb:af:b8:0b:e7:95:40:18:a8:73:5d:84:
	27:17:af:bb:c5:48:3d:25:57:8e:7b:8e:e4:48:b6:
	03:70:b7:ff:d9:f4:86:a6:d8:dd:d6:08:55:17:43:
	2f:7f:84:3f:95:98:b4:8b:f3:17:39:fe:23:02:ce:
	7f:dc:fb:e3:49:

prime2:
	00:da:91:29:50:d4:de:78:7e:68:30:14:3c:ea:62:
	34:65:5c:54:b9:0f:4f:2d:1f:ce:02:d3:1b:cd:7e:
	28:e3:db:7d:40:c1:5f:f3:85:df:d3:b1:a9:41:45:
	78:12:b7:6e:00:1f:49:c3:64:ae:50:a4:76:c2:a4:
	53:48:bb:93:b7:

coefficient:
	00:ae:c4:34:4f:5a:cc:dc:38:3c:72:c7:d9:98:7b:
	3a:4c:12:8f:94:98:5e:cc:2a:7a:f9:25:3e:bf:29:
	dc:1f:56:78:ba:df:b0:3f:2f:91:98:42:fd:fd:87:
	72:52:c1:ee:06:29:07:4b:b9:1b:4f:3b:ef:71:96:
	72:8a:a5:48:12:

exp1:
	00:b4:81:35:34:c6:47:3c:44:c3:d1:1d:ae:fa:b5:
	6e:18:31:be:84:ef:80:65:72:a8:0f:26:f5:76:be:
	ab:f8:fe:f2:90:10:60:f9:27:2e:23:3a:12:5e:1b:
	59:82:1e:2f:ec:0c:fe:f0:22:96:4f:28:b7:3e:e5:
	c3:24:e0:1c:51:

exp2:
	3c:66:87:33:66:50:40:9e:36:2e:ab:39:16:50:a3:
	48:2b:96:e2:39:5f:d9:09:84:05:f5:cf:26:1f:aa:
	2f:25:d5:dc:52:54:30:d9:1b:3c:c6:49:0e:d7:a2:
	d2:11:4c:dd:cd:c7:b5:ae:9a:19:81:09:ac:ca:7a:
	95:8b:f8:cb:


Public Key ID: 9F:01:F1:02:4E:A7:03:1E:49:F7:7F:D4:34:B6:97:3A:A6:B1:58:84
Public key's random art:
+--[ RSA 1024]----+
|   .+.+ o     +  |
|   ..* = o.  + o.|
|    . + +E... o..|
|       . +..  .. |
|        S oo.+   |
|         .o+= .  |
|         .oo     |
|                 |
|                 |
+-----------------+

-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1027 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-mozilla-maintainers/attachments/20130423/c2518358/attachment.pgp>


More information about the pkg-mozilla-maintainers mailing list