[Bug 2102115] Re: gnutls ocsp failure
Eduardo Barretto
2102115 at bugs.launchpad.net
Tue Apr 8 08:08:20 UTC 2025
** Information type changed from Private Security to Public
** Also affects: gnutls28 (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Oracular)
Importance: Undecided
Status: New
** Changed in: gnutls28 (Ubuntu Noble)
Status: New => Confirmed
** Changed in: gnutls28 (Ubuntu Oracular)
Status: New => Confirmed
** Changed in: gnutls28 (Ubuntu Plucky)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to gnutls28 in Ubuntu.
https://bugs.launchpad.net/bugs/2102115
Title:
gnutls ocsp failure
Status in Gnutls:
Fix Released
Status in gnutls28 package in Ubuntu:
Fix Released
Status in gnutls28 source package in Noble:
Confirmed
Status in gnutls28 source package in Oracular:
Confirmed
Status in gnutls28 source package in Plucky:
Fix Released
Status in gnutls28 package in Debian:
New
Bug description:
This bug affects libgnutls30t64 in 24.04 and 24.10. This package was
not available in the list (only gnutls28 was).
Any applications that use gnutls versions less than 3.8.8 for TLS fail
to properly validate certificates using OCSP when the OCSP response
contains multiple responses if the first response does not match the
server presented certificate.
This was fixed in gnutls in September 2024,
https://github.com/gnutls/gnutls/commit/ae404fe8488dee424876b5963c00d7e041672415
and released in gnutls 3.8.8.
git in ubuntu is compiled against libcurl/gnutls instead of
libcurl/openssl this creates a significant issue for users using
Ubuntu with no alternative workaround besides compiling their own
version of git, or disabling http verification.
Can you please backport this change to 24.04 for LTS support?
This bug exists (was tested in 24.04 and 24.10).
When the bug is encountered, the user just gets a certification is not
trusted error. To identify the root cause, it required setting the
environment GNUTLS_DEBUG_LEVEL=99, identifying the error "Got OCSP
response with an unrelated certificate.". Then we used `gnutls-cli
--save-ocsp=ocsp.dat {website}` and `ocsptool -S ocsp.dat -j` to see
the multiple responses and that the certificate serial number from
`gnutls-cli` was shown in the `ocsptool` output, but not the first
response.
Failure to fix this bug will likely encourage user to disable http
verification as the easier solution, which makes websites with OCSP
responders that respond with multiple responses potentially vulnerable
to targeted MITM attacks.
Ideally, backporting 3.8.9, which you already have proposed for 25.04
would be preferable, or patching your existing 3.8.3 with the OCSP
commit which wouldn't trigger any ABI/API changes.
To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/2102115/+subscriptions
More information about the foundations-bugs
mailing list