SSL-PROBLEMS 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. _ _ ____ _
  2. ___| | | | _ \| |
  3. / __| | | | |_) | |
  4. | (__| |_| | _ <| |___
  5. \___|\___/|_| \_\_____|
  6. SSL problems
  7. First, let's establish that we often refer to TLS and SSL interchangeably as
  8. SSL here. The current protocol is called TLS, it was called SSL a long time
  9. ago.
  10. There are several known reasons why a connection that involves SSL might
  11. fail. This is a document that attempts to details the most common ones and
  12. how to mitigate them.
  13. CA certs
  14. CA certs are used to digitally verify the server's certificate. You need a
  15. "ca bundle" for this. See lots of more details on this in the SSLCERTS
  16. document.
  17. CA bundle missing intermediate certificates
  18. When using said CA bundle to verify a server cert, you will experience
  19. problems if your CA cert does not have the certificates for the
  20. intermediates in the whole trust chain.
  21. SSL version
  22. Some broken servers fail to support the protocol negotiation properly that
  23. SSL servers are supposed to handle. This may cause the connection to fail
  24. completely. Sometimes you may need to explicitly select a SSL version to use
  25. when connecting to make the connection succeed.
  26. An additional complication can be that modern SSL libraries sometimes are
  27. built with support for older SSL and TLS versions disabled!
  28. SSL ciphers
  29. Clients give servers a list of ciphers to select from. If the list doesn't
  30. include any ciphers the server wants/can use, the connection handshake
  31. fails.
  32. curl has recently disabled the user of a whole bunch of seriously insecure
  33. ciphers from its default set (slightly depending on SSL backend in use).
  34. You may have to explicitly provide an alternative list of ciphers for curl
  35. to use to allow the server to use a WEAK cipher for you.
  36. Note that these weak ciphers are identified as flawed. For example, this
  37. includes symmetric ciphers with less than 128 bit keys and RC4.
  38. References:
  39. http://tools.ietf.org/html/draft-popov-tls-prohibiting-rc4-01
  40. Allow BEAST
  41. BEAST is the name of a TLS 1.0 attack that surfaced 2011. When adding means
  42. to mitigate this attack, it turned out that some broken servers out there in
  43. the wild didn't work properly with the BEAST mitigation in place.
  44. To make such broken servers work, the --ssl-allow-beast option was
  45. introduced. Exactly as it sounds, it re-introduces the BEAST vulnerability
  46. but on the other hand it allows curl to connect to that kind of strange
  47. servers.