Freebox Server (Ultra V9/ Pop V8/ Delta V7 / Revolution V6 / Mini 4K)

  • État Fermée
  • Pourcentage achevé
    100%
  • Type Anomalie
  • Catégorie Services locaux
  • Assignée à Personne
  • Système d'exploitation Tous
  • Sévérité Critique
  • Priorité Très Basse
  • Basée sur la version 3.5.1
  • Due pour la version Non décidée
  • Échéance Non décidée
  • Votes 1
  • Privée
Concerne le projet: Freebox Server (Ultra V9/ Pop V8/ Delta V7 / Revolution V6 / Mini 4K)
Ouverte par nbanba - 23/02/2018
Dernière modification par mbizon - 18/09/2020

FS#22430 - SSL HANDSHAKE WHILE CONNECTING FTP USING FTPES://

Bonjour,

sévérité: critique: le service FTP ne fonctionne pas depuis l’extérieur

Je remonte ce BUG qui est présent au moins depuis la version 3.3 et est toujours présent en version 3.5.1:

Il y a manifestement un problème côté pki empechant le TLS de fonctionner correctement.

Pourriez vous faire quelque chose ?

En vous remerciant d’avance,
Bien cordialement,
nbanba

ANNEXES:
Voici l’échange et le refus de connexion après avoir insérer la bonne methode d’authentification AUTH TLS (before login) :

curl -vvv –insecure –tlsv1.2 –ftp-ssl-control ftp://freebox@home.soartist.net:21 * Rebuilt URL to: ftp://freebox@home.soartist.net:21/ * Trying 82.230.38.86...
* TCP_NODELAY set
* Connected to home.soartist.net (82.230.38.86) port 21 (#0)
< 220 Welcome to Freebox FTP Server.
> AUTH SSL < 504 Unknown AUTH type.
> AUTH TLS
< 234 Proceed with negotiation.
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt

CApath: /etc/ssl/certs

* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Unknown (21):
* TLSv1.2 (IN), TLS alert, Server hello (2):
* error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
* Closing connection 0
curl: (35) error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure

OPENSSL s_client -connect output :

openssl s_client -tls1_2 -debug -connect home.soartist.net:21
CONNECTED(00000003)
write to 0x56006938f770 [0x56006939f0f0] (176 bytes ⇒ 176 (0xB0))
0000 - 16 03 01 00 ab 01 00 00-a7 03 03 46 61 6b 35 22 ...........Fak5” 0010 - 11 96 ef ff 3c 47 6d 0f-0c 31 9b b0 80 8c 68 f7 ....<Gm..1....h.
0020 - f7 ee ab 30 53 35 91 18-00 7f 8a 00 00 38 c0 2c ...0S5.......8.,
0030 - c0 30 00 9f cc a9 cc a8-cc aa c0 2b c0 2f 00 9e .0.........+./..
0040 - c0 24 c0 28 00 6b c0 23-c0 27 00 67 c0 0a c0 14 .$.(.k.#.’.g....
0050 - 00 39 c0 09 c0 13 00 33-00 9d 00 9c 00 3d 00 3c .9.....3.....=.<
0060 - 00 35 00 2f 00 ff 01 00-00 46 00 0b 00 04 03 00 .5./.....F......
0070 - 01 02 00 0a 00 0a 00 08-00 1d 00 17 00 19 00 18 ................
0080 - 00 23 00 00 00 0d 00 20-00 1e 06 01 06 02 06 03 .#..... ........
0090 - 05 01 05 02 05 03 04 01-04 02 04 03 03 01 03 02 ................
00a0 - 03 03 02 01 02 02 02 03-00 16 00 00 00 17 ..............
00b0 - <SPACES/NULS>
read from 0x56006938f770 [0x560069395ea3] (5 bytes ⇒ 5 (0×5))
0000 - 32 32 30 20 57 220 W
139943250072832:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:../ssl/record/ssl3_record.c:252:
— no peer certificate available
— No client certificate CA names sent
SSL handshake has read 5 bytes and written 176 bytes
Verification: OK
— New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:

  Protocol  : TLSv1.2
  Cipher    : 0000
  Session-ID: 
  Session-ID-ctx: 
  Master-Key: 
  PSK identity: None
  PSK identity hint: None
  SRP username: None
  Start Time: 1519369857
  Timeout   : 7200 (sec)
  Verify return code: 0 (ok)
  Extended master secret: no

GNUTLS-CLI output :

gnutls-cli –debug=10 –insecure –starttls-proto=ftp home.soartist.net:21
Processed 0 CA certificate(s).
Resolving ‘home.soartist.net:21’...
Connecting to ‘82.230.38.86:21’...

<5>
<3>
<5>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<2>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<4>
<5>
<9>
<5>
<3>
<10>
<10>
<10>
<10>
<5>
<5>
<5>
<10>
<10>
<10>
<10>
<5>
<5> REC[0x55959897af60]: Alert[2
<3>
<3>
<3>
<3>
<3>
<3>

* Fatal error: A TLS fatal alert has been received.
* Received alert [40]: Handshake failed

<5> REC: Sending Alert[2
<5>
<9>
<5>

*** handshake has failed: A TLS fatal alert has been received.

Fermée par  mbizon
18.09.2020 07:36
Raison de la fermeture :  Résolu
nbanba a commenté le 23.02.2018 07:22

Bonjour

probleme d'interpretation par ce site de l'output de ma console donc voici un lien ou l'output est dispo dan sun fichier text :
ftp://http://62.210.178.137/default/bug-fbx-ftpes

En vous remerciant pour votre aide et le debug
nbanba

nbanba a commenté le 23.02.2018 07:23

le lien valide : http//62.210.178.137/default/bug-fbx-ftpes

Admin
minico a commenté le 11.06.2020 16:59

Bonsoir,

Est-ce que la chaine de certificat que vous avez installé via FreeboxOS comporte un certificat intermédiaire ?

Cordialement,

nbanba a commenté le 11.06.2020 17:46

Bonjour,

Non, le certificat est émis sous la racine de la PKI et sans intermédiaires (cette pki est dédiée aux devices du segment interne ou j'ai ma freebox).
D'ailleurs, il serait bien de pouvoir injecter la clé publique de la rootCA dans la freebox.

Depuis l'ouverture de ce ticket, j'ai changé de client et de box (maintenant j'ai une Delta en dernière version fbxOS)
Les clients ont également changés : distrib linux + 2 ou 3 release majeur, N réinstallations complètes de X machines (toutes à jour) servant aujourd'hui de clients.

En refaisant le test à l'instant sur mon dernier laptop (XPS15 7590) qui a 2 mois et qui est en debian 10.4, j'obtiens les mêmes erreurs avec cURL et avec gnutls-bin, même en passant la version de TLS à 1.3 :

output gnutls : gnutls-cli –debug=10 –insecure –starttls-proto=ftp home.soartist.net:21

Processed 0 CA certificate(s).
Resolving 'home.soartist.net:21'...
Connecting to '82.64.89.127:21'...
|<5>| REC[0x5639ff383410]: Allocating epoch #0
|<2>| added 6 protocols, 29 ciphersuites, 18 sig algos and 9 groups into priority list
|<5>| REC[0x5639ff383410]: Allocating epoch #1
|<4>| HSK[0x5639ff383410]: Adv. version: 3.3
|<2>| Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384)
|<2>| Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256)
|<2>| Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256)
|<2>| Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256)
|<2>| Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384)
|<2>| Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305)
|<2>| Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM)
|<2>| Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1)
|<2>| Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256)
|<2>| Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM)
|<2>| Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1)
|<2>| Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384)
|<2>| Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305)
|<2>| Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1)
|<2>| Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256)
|<2>| Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1)
|<2>| Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384)
|<2>| Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM)
|<2>| Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1)
|<2>| Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256)
|<2>| Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM)
|<2>| Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1)
|<2>| Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384)
|<2>| Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305)
|<2>| Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM)
|<2>| Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1)
|<2>| Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256)
|<2>| Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM)
|<2>| Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1)
|<4>| EXT[0x5639ff383410]: Preparing extension (OCSP Status Request/5) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension OCSP Status Request/5 (5 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Client Certificate Type/19) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Server Certificate Type/20) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Supported Groups/10) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sent group SECP256R1 (0x17)
|<4>| EXT[0x5639ff383410]: Sent group SECP384R1 (0x18)
|<4>| EXT[0x5639ff383410]: Sent group SECP521R1 (0x19)
|<4>| EXT[0x5639ff383410]: Sent group X25519 (0x1d)
|<4>| EXT[0x5639ff383410]: Sent group FFDHE2048 (0x100)
|<4>| EXT[0x5639ff383410]: Sent group FFDHE3072 (0x101)
|<4>| EXT[0x5639ff383410]: Sent group FFDHE4096 (0x102)
|<4>| EXT[0x5639ff383410]: Sent group FFDHE6144 (0x103)
|<4>| EXT[0x5639ff383410]: Sent group FFDHE8192 (0x104)
|<4>| EXT[0x5639ff383410]: Sending extension Supported Groups/10 (20 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Supported EC Point Formats/11) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension Supported EC Point Formats/11 (2 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (SRP/12) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Signature Algorithms/13) for 'client hello'
|<4>| EXT[0x5639ff383410]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x5639ff383410]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x5639ff383410]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x5639ff383410]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x5639ff383410]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x5639ff383410]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x5639ff383410]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x5639ff383410]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x5639ff383410]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x5639ff383410]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x5639ff383410]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x5639ff383410]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x5639ff383410]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x5639ff383410]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x5639ff383410]: sent signature algo (2.3) ECDSA-SHA1
|<4>| EXT[0x5639ff383410]: Sending extension Signature Algorithms/13 (32 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (SRTP/14) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Heartbeat/15) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (ALPN/16) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Encrypt-then-MAC/22) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension Encrypt-then-MAC/22 (0 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Extended Master Secret/23) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension Extended Master Secret/23 (0 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Session Ticket/35) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension Session Ticket/35 (0 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Key Share/51) for 'client hello'
|<4>| EXT[0x5639ff383410]: sending key share for SECP256R1
|<4>| EXT[0x5639ff383410]: sending key share for X25519
|<4>| EXT[0x5639ff383410]: Sending extension Key Share/51 (107 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Supported Versions/43) for 'client hello'
|<2>| Advertizing version 3.4
|<2>| Advertizing version 3.3
|<2>| Advertizing version 3.2
|<2>| Advertizing version 3.1
|<4>| EXT[0x5639ff383410]: Sending extension Supported Versions/43 (9 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Post Handshake Auth/49) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Safe Renegotiation/65281) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Server Name Indication/0) for 'client hello'
|<2>| HSK[0x5639ff383410]: sent server name: 'home.soartist.net'
|<4>| EXT[0x5639ff383410]: Sending extension Server Name Indication/0 (22 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Cookie/44) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Early Data/42) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension PSK Key Exchange Modes/45 (3 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Record Size Limit/28) for 'client hello'
|<4>| EXT[0x5639ff383410]: Sending extension Record Size Limit/28 (2 bytes)
|<4>| EXT[0x5639ff383410]: Preparing extension (Maximum Record Size/1) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (ClientHello Padding/21) for 'client hello'
|<4>| EXT[0x5639ff383410]: Preparing extension (Pre Shared Key/41) for 'client hello'
|<4>| HSK[0x5639ff383410]: CLIENT HELLO was queued [358 bytes]
|<5>| REC[0x5639ff383410]: Preparing Packet Handshake(22) with length: 358 and min pad: 0
|<9>| ENC[0x5639ff383410]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<5>| REC[0x5639ff383410]: Sent Packet[1] Handshake(22) in epoch 0 and length: 363
|<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1171
|<10>| READ: Got 5 bytes from 0x7ffd28006070
|<10>| READ: read 5 bytes from 0x7ffd28006070
|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<10>| RB: Requested 5 bytes
|<5>| REC[0x5639ff383410]: SSL 3.3 Alert packet received. Epoch 0, length: 2
|<5>| REC[0x5639ff383410]: Expected Packet Handshake(22)
|<5>| REC[0x5639ff383410]: Received Packet Alert(21) with length: 2
|<10>| READ: Got 2 bytes from 0x7ffd28006070
|<10>| READ: read 2 bytes from 0x7ffd28006070
|<10>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<10>| RB: Requested 7 bytes
|<5>| REC[0x5639ff383410]: Decrypted Packet[0] Alert(21) with length: 2
|<5>| REC[0x5639ff383410]: Alert[2|40] - Handshake failed - was received
|<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:878
|<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:885
|<3>| ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1577
|<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1448
|<3>| ASSERT: ../../lib/handshake.c[_gnutls_recv_handshake]:1506
|<3>| ASSERT: ../../lib/handshake.c[handshake_client]:2998
*** Fatal error: A TLS fatal alert has been received.
*** Received alert [40]: Handshake failed
|<3>| ASSERT: ../../lib/alert.c[gnutls_alert_send_appropriate]:375

output cURL : curl -vvv –insecure –tlsv1.3 –ftp-ssl-control ftp://freebox@home.soartist.net:21 idem en mettant –tlsvv1.x , x allant de rien à 3

19:43:09 nba@lap-nba:~$ curl -vvv --insecure --tlsv1.3 --ftp-ssl-control ftp://freebox@home.soartist.net:21
* Expire in 0 ms for 6 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 0 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 1 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 2 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 3 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 3 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 4 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 8 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 5 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 5 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 8 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 7 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 7 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 8 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 7 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 7 ms for 1 (transfer 0x556ed0acdf50)
* Expire in 10 ms for 1 (transfer 0x556ed0acdf50)
*   Trying 82.64.89.127...
* TCP_NODELAY set
* Expire in 200 ms for 4 (transfer 0x556ed0acdf50)
* Connected to home.soartist.net (82.64.89.127) port 21 (#0)
< 220 Welcome to Freebox FTP Server.
> AUTH SSL
< 504 Unknown AUTH type.
> AUTH TLS
< 234 Proceed with negotiation.
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS alert, handshake failure (552):
* error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure
* Closing connection 0
curl: (35) error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure

Depuis que je suis passé sur une delta en fibre a 10G, je suis encore plus inerressé par cette option.

Cordialement,
nbanba

nbanba a commenté le 11.06.2020 17:53

Bonjour

Sorry j'ai oublié l'output d'openSSL qui est identique en tls1.2 et en tls1.3

TLS1.2

19:46:55 nba@lap-nba:~$ openssl s_client -tls1_2 -debug -connect home.soartist.net:21
CONNECTED(00000003)
write to 0x5646fa276150 [0x5646fa288840] (214 bytes => 214 (0xD6))
0000 - 16 03 01 00 d1 01 00 00-cd 03 03 0d de 96 97 f5   ................
0010 - 5d 66 95 61 d6 3b 63 72-47 fb 1d 96 9c 36 ae d3   ]f.a.;crG....6..
0020 - b1 05 78 ba 23 11 b2 d9-30 d6 0c 00 00 38 c0 2c   ..x.#...0....8.,
0030 - c0 30 00 9f cc a9 cc a8-cc aa c0 2b c0 2f 00 9e   .0.........+./..
0040 - c0 24 c0 28 00 6b c0 23-c0 27 00 67 c0 0a c0 14   .$.(.k.#.'.g....
0050 - 00 39 c0 09 c0 13 00 33-00 9d 00 9c 00 3d 00 3c   .9.....3.....=.<
0060 - 00 35 00 2f 00 ff 01 00-00 6c 00 00 00 16 00 14   .5./.....l......
0070 - 00 00 11 68 6f 6d 65 2e-73 6f 61 72 74 69 73 74   ...home.soartist
0080 - 2e 6e 65 74 00 0b 00 04-03 00 01 02 00 0a 00 0c   .net............
0090 - 00 0a 00 1d 00 17 00 1e-00 19 00 18 00 23 00 00   .............#..
00a0 - 00 16 00 00 00 17 00 00-00 0d 00 2a 00 28 04 03   ...........*.(..
00b0 - 05 03 06 03 08 07 08 08-08 09 08 0a 08 0b 08 04   ................
00c0 - 08 05 08 06 04 01 05 01-06 01 03 03 03 01 03 02   ................
00d0 - 04 02 05 02 06 02                                 ......
read from 0x5646fa276150 [0x5646fa27f533] (5 bytes => 5 (0x5))
0000 - 32 32 30 20 57                                    220 W
140399272268928:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:../ssl/record/ssl3_record.c:332:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 5 bytes and written 214 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : 0000
    Session-ID: 
    Session-ID-ctx: 
    Master-Key: 
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1591897619
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
---
read from 0x5646fa276150 [0x5646fa26c3d0] (8192 bytes => 31 (0x1F))
0000 - 65 6c 63 6f 6d 65 20 74-6f 20 46 72 65 65 62 6f   elcome to Freebo
0010 - 78 20 46 54 50 20 53 65-72 76 65 72 2e 0d 0a      x FTP Server...
read from 0x5646fa276150 [0x5646fa26c3d0] (8192 bytes => 0 (0x0))

TLS1.3

19:46:59 nba@lap-nba:~$ openssl s_client -tls1_3 -debug -connect home.soartist.net:21
CONNECTED(00000003)
write to 0x5652ebb45150 [0x5652ebb57840] (241 bytes => 241 (0xF1))
0000 - 16 03 01 00 ec 01 00 00-e8 03 03 2b e7 c8 90 09   ...........+....
0010 - 26 4d f5 95 c8 c3 d0 d1-6a 45 85 77 40 a5 8a 12   &M......jE.w@...
0020 - 43 69 26 14 8a 22 c4 fc-23 f6 3a 20 cf 8f a2 00   Ci&.."..#.: ....
0030 - d7 65 37 fe cf 29 32 99-30 d8 8b cf c1 b0 16 a1   .e7..)2.0.......
0040 - 79 5e 52 8a cc d2 84 05-ae ce 1d 41 00 08 13 02   y^R........A....
0050 - 13 03 13 01 00 ff 01 00-00 97 00 00 00 16 00 14   ................
0060 - 00 00 11 68 6f 6d 65 2e-73 6f 61 72 74 69 73 74   ...home.soartist
0070 - 2e 6e 65 74 00 0b 00 04-03 00 01 02 00 0a 00 0c   .net............
0080 - 00 0a 00 1d 00 17 00 1e-00 19 00 18 00 23 00 00   .............#..
0090 - 00 16 00 00 00 17 00 00-00 0d 00 1e 00 1c 04 03   ................
00a0 - 05 03 06 03 08 07 08 08-08 09 08 0a 08 0b 08 04   ................
00b0 - 08 05 08 06 04 01 05 01-06 01 00 2b 00 03 02 03   ...........+....
00c0 - 04 00 2d 00 02 01 01 00-33 00 26 00 24 00 1d 00   ..-.....3.&.$...
00d0 - 20 b1 42 fc db 3b 47 35-59 ca 18 97 b9 28 0f d4    .B..;G5Y....(..
00e0 - 9a fd 40 93 1d 7e c3 51-7d eb 8f 04 7f 1e 5f 9e   ..@..~.Q}....._.
00f0 - 0c                                                .
read from 0x5652ebb45150 [0x5652ebb4e533] (5 bytes => 5 (0x5))
0000 - 32 32 30 20 57                                    220 W
140211120956544:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:../ssl/record/ssl3_record.c:332:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 5 bytes and written 241 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
read from 0x5652ebb45150 [0x5652ebb3b3d0] (8192 bytes => 31 (0x1F))
0000 - 65 6c 63 6f 6d 65 20 74-6f 20 46 72 65 65 62 6f   elcome to Freebo
0010 - 78 20 46 54 50 20 53 65-72 76 65 72 2e 0d 0a      x FTP Server...
read from 0x5652ebb45150 [0x5652ebb3b3d0] (8192 bytes => 0 (0x0))



Rien en change donc par rapport aux tests que j'avais fait en 2018.

Cordialement,
nbanba

Admin
minico a commenté le 26.08.2020 17:03

Bonsoir,

Nous avons corrigé un bug dans le ftp empêchant l'utilisation de certificats sans intermédiaires, dans les firmwares récents.

Est-ce que vous pouvez me dire si le bug est toujours présent ?

Merci et bonne soirée,

nbanba a commenté le 26.08.2020 17:34

Bonjour
Je suis encore en congé, je ne pourrais tester que la semaine prochaine.
Je vous fais un retour des que je rentre.
Sorry !

Cordialement
nbanba

nbanba a commenté le 02.09.2020 17:00

Bonjour,

Merci ça fonctionne :

curl -vvv --insecure --tlsv1.2 --ftp-ssl-control ftp://freebox:xxxxxxxxxxxxxxxxxxxxx@home.soartist.net:21 
* Expire in 0 ms for 6 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 1 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 2 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
* Expire in 0 ms for 1 (transfer 0x556d6b7e5f50)
*   Trying 82.64.89.127...
* TCP_NODELAY set
* Expire in 200 ms for 4 (transfer 0x556d6b7e5f50)
* Connected to home.soartist.net (82.64.89.127) port 21 (#0)
< 220 Welcome to Freebox FTP Server.
> AUTH SSL
< 504 Unknown AUTH type.
> AUTH TLS
< 234 Proceed with negotiation.
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Server certificate:
*  subject: C=FR; ST=Paris; O=3xo; OU=home; CN=home.soartist.net; emailAddress=tunelaconnaiterapas@3xo.fr
*  start date: Feb 20 15:31:41 2018 GMT
*  expire date: Feb 18 15:31:41 2028 GMT
*  issuer: C=FR; ST=Paris; O=3xo; CN=3xo.fr; emailAddress=tunelaconnaiterapasnonplus@3xo.fr
*  SSL certificate verify result: CA signature digest algorithm too weak (68), continuing anyway.
> USER freebox
< 331 User name okay, need password.
> PASS xxxxxxxxxxxxxxxxxxxxx
< 230 User logged in, proceed.
> PBSZ 0
< 200 Command Okay.
> PROT C
< 200 Command Okay.
> PWD
< 257 "/"
* Entry path is '/'
> EPSV
* Connect data stream passively
* ftp_perform ends with SECONDARY: 0
< 229 Entering extended passive mode (|||60000|)
*   Trying 82.64.89.127...
* TCP_NODELAY set
* Expire in 200 ms for 4 (transfer 0x556d6b7e5f50)
* Connecting to 82.64.89.127 (82.64.89.127) port 60000
* Connected to home.soartist.net (82.64.89.127) port 21 (#0)
> TYPE A
< 200 Command Okay.
> LIST
< 150 File Status OK.
* Maxdownload = -1
drwxr-xr-x   5  freebox  freebox      100 Aug 15 18:18 ..
drwx------  12  freebox  freebox     4096 Feb 27  2019 1000G
drwxr-xr-x  15  freebox  freebox     4096 Aug 15 10:19 FBX-2000G
drwxr-xr-x  12  freebox  freebox     4096 Mar 27 17:03 FBX-500G
* Remembering we are in dir ""
< 226 Closing data connection.
* Connection #0 to host home.soartist.net left intact


Pour moi, vous pouvez fermer ce case

Merci,
Cordialement,
nbanba

Admin
minico a commenté le 02.09.2020 17:15

Bonsoir,

Merci pour le retour, je close le case.

Bonne soirée,

Chargement...

Activer les raccourcis clavier

Liste des tâches

Détails de la tâche

Édition de la tâche