AskOverflow.Dev

AskOverflow.Dev Logo AskOverflow.Dev Logo

AskOverflow.Dev Navigation

  • 主页
  • 系统&网络
  • Ubuntu
  • Unix
  • DBA
  • Computer
  • Coding
  • LangChain

Mobile menu

Close
  • 主页
  • 系统&网络
    • 最新
    • 热门
    • 标签
  • Ubuntu
    • 最新
    • 热门
    • 标签
  • Unix
    • 最新
    • 标签
  • DBA
    • 最新
    • 标签
  • Computer
    • 最新
    • 标签
  • Coding
    • 最新
    • 标签
主页 / ubuntu / 问题 / 1233186
Accepted
Łukasz Sypniewski
Łukasz Sypniewski
Asked: 2020-04-30 16:17:01 +0800 CST2020-04-30 16:17:01 +0800 CST 2020-04-30 16:17:01 +0800 CST

Ubuntu 20.04 - 如何设置较低的 SSL 安全级别?

  • 772

我想问一下是否有办法在 Ubuntu 20.04 上将 SSL 安全级别降低到 1,因为我收到:

141A318A:SSL routines:tls_process_ske_dhe:dh key too small

尝试卷曲网站时。

如果我添加参数,Curl 可以工作--ciphers 'DEFAULT:!DH',但是,我无法通过用 C# 编写的客户端应用程序获取网站。该网站在通过浏览器打开时也可以工作。

根据bugs.launchpad.net的说法,Ubuntu 团队故意设置了更高的 SSL 安全级别。

在几个地方,我遇到了更改CipherString = DEFAULT@SECLEVEL=2为1inopenssl.cnf帮助的信息,但是我的配置文件根本没有这样的行,并且添加它没有任何效果。

我不控制网站服务器,因此无法更改其安全配置。

有任何想法吗?安装一些较旧的 openSSL 包会有所帮助吗?

提前致谢

编辑:至于对我的配置文件的更改,我在最后添加了以下内容:

system_default = system_default_sect 

[system_default_sect] 
MinProtocol = TLSv1.2
CipherString = DEFAULT@SECLEVEL=1 

输出openssl version -a:

OpenSSL 1.1.1f 31 Mar 2020 built on: Mon Apr 20 11:53:50 2020 UTC
platform: debian-amd64
options: bn(64,64) rc4(16x,int) des(int) blowfish(ptr)
compiler: gcc -fPIC -pthread -m64 -Wa,--noexecstack -Wall -Wa,
--noexecstack -g -O2 -fdebug-prefix-map=/build/openssl-P_ODHM/openssl-1.1.1f=. 
-fstack-protector-strong -Wformat -Werror=format-security
-DOPENSSL_TLS_SECURITY_LEVEL=2 -DOPENSSL_USE_NODELETE
-DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ
-DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT
-DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m
-DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM
-DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM
-DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM -DNDEBUG
-Wdate-time -D_FORTIFY_SOURCE=2
OPENSSLDIR: "/usr/lib/ssl" ENGINESDIR:
"/usr/lib/x86_64-linux-gnu/engines-1.1" Seeding source: os-specific
security ssl openssl curl 20.04
  • 5 5 个回答
  • 110118 Views

5 个回答

  • Voted
  1. Best Answer
    Matt Caswell
    2020-05-01T05:29:40+08:002020-05-01T05:29:40+08:00

    您的配置更改不太正确。您需要将其添加到配置文件的开头:

    openssl_conf = default_conf
    

    然后到最后:

    [ default_conf ]
    
    ssl_conf = ssl_sect
    
    [ssl_sect]
    
    system_default = system_default_sect
    
    [system_default_sect]
    MinProtocol = TLSv1.2
    CipherString = DEFAULT:@SECLEVEL=1
    

    请注意,如果您愿意,可以更改配置文件的本地副本,然后确保使用OPENSSL_CONF定义为指向配置文件位置的环境变量启动进程:

    export OPENSSL_CONF=/path/to/my/openssl.cnf
    

    通过这种方式,您可以进行更改而不必影响整个系统。

    注意:要查找系统的 openssl.cnf 文件,请运行以下命令:

    % openssl version -d
    

    ls -l在输出的目录上运行以openssl.cnf根据需要通过该目录中的符号链接查看文件的位置。

    • 94
  2. WHY
    2020-12-01T23:29:42+08:002020-12-01T23:29:42+08:00

    编辑openssl.conf文件:

    sudo nano /etc/ssl/openssl.cnf
    

    在顶部添加这一行:

    openssl_conf = openssl_init
    

    并在最后添加这些行:

    [openssl_init]
    ssl_conf = ssl_sect
    
    [ssl_sect]
    system_default = system_default_sect
    
    [system_default_sect]
    CipherString = DEFAULT@SECLEVEL=1
    

    这个对我有用。:)

    参考:当我尝试 CURL 网站时,我收到 SSL 错误

    对于 Laravel,也运行

    sudo service php7.4-fpm restart
    
    • 16
  3. Wolfgang Fahl
    2020-10-02T07:31:55+08:002020-10-02T07:31:55+08:00

    上面的两个解决方案让我感到困惑。

    您只需要在 /usr/lib/ssl/openssl.cnf 中进行两处修改,如下所示:

         rcsdiff ./openssl.cnf 
        ===================================================================
        RCS file: ./openssl.cnf,v
        retrieving revision 1.1
        diff -r1.1 ./openssl.cnf
        13a14,15
        > openssl_conf = default_conf
        > 
        350a353,362
        > 
        > [default_conf]
        > ssl_conf = ssl_sect
        > 
        > [ssl_sect]
        > system_default = system_default_sect
        > 
        > [system_default_sect]
        > MinProtocol = TLSv1.2
        > CipherString = DEFAULT@SECLEVEL=1
    
    

    对于剪切和粘贴:

    openssl_conf = default_conf
    
    [default_conf]
    ssl_conf = ssl_sect
    
    [ssl_sect]
    system_default = system_default_sect
    
    [system_default_sect]
    MinProtocol = TLSv1.2
    CipherString = DEFAULT@SECLEVEL=1
    
    • 5
  4. baptx
    2020-08-07T10:33:37+08:002020-08-07T10:33:37+08:00

    更新:如果您通过在https://packages.ubuntu.com/search?keywords=openssl&searchon=names上下载从 deb 文件中提取默认配置,之前的答案似乎有效。

    更新 2:实际上之前的答案对我不起作用,因为我使用了错误的配置文件,[system_default_sect]而不是[ssl_default_sect]. 我从https://wiki.debian.org/ContinuousIntegration/TriagingTips/openssl-1.1.1复制粘贴似乎是一个错误。可以使用名称 system_default_sect 来与 Debian 保持一致,您只需要在任何地方都使用它而不是 ssl_default_sect。

    原答案:

    之前的答案在 Ubuntu 20.04 上对我不起作用,所以我在 Ubuntu 上使用了我的 Debian LXC 容器中的配置文件并更改SECLEVEL=2为SECLEVEL=1.

    我将文件另存为/etc/ssl/openssl_custom.cnf,然后在需要时使用上一个答案中共享的命令加载另一个配置文件:

    export OPENSSL_CONF=/etc/ssl/openssl_custom.cnf

    这是对我有用的完整配置文件(您也可以通过在https://packages.debian.org/stable/openssl上下载 deb 文件来提取默认配置):

    #
    # OpenSSL example configuration file.
    # This is mostly being used for generation of certificate requests.
    #
    
    # Note that you can include other files from the main configuration
    # file using the .include directive.
    #.include filename
    
    # This definition stops the following lines choking if HOME isn't
    # defined.
    HOME                    = .
    
    # Extra OBJECT IDENTIFIER info:
    #oid_file               = $ENV::HOME/.oid
    oid_section             = new_oids
    
    # System default
    openssl_conf = default_conf
    
    # To use this configuration file with the "-extfile" option of the
    # "openssl x509" utility, name here the section containing the
    # X.509v3 extensions to use:
    # extensions            =
    # (Alternatively, use a configuration file that has only
    # X.509v3 extensions in its main [= default] section.)
    
    [ new_oids ]
    
    # We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
    # Add a simple OID like this:
    # testoid1=1.2.3.4
    # Or use config file substitution like this:
    # testoid2=${testoid1}.5.6
    
    # Policies used by the TSA examples.
    tsa_policy1 = 1.2.3.4.1
    tsa_policy2 = 1.2.3.4.5.6
    tsa_policy3 = 1.2.3.4.5.7
    
    ####################################################################
    [ ca ]
    default_ca      = CA_default            # The default ca section
    
    ####################################################################
    [ CA_default ]
    
    dir             = ./demoCA              # Where everything is kept
    certs           = $dir/certs            # Where the issued certs are kept
    crl_dir         = $dir/crl              # Where the issued crl are kept
    database        = $dir/index.txt        # database index file.
    #unique_subject = no                    # Set to 'no' to allow creation of
                                            # several certs with same subject.
    new_certs_dir   = $dir/newcerts         # default place for new certs.
    
    certificate     = $dir/cacert.pem       # The CA certificate
    serial          = $dir/serial           # The current serial number
    crlnumber       = $dir/crlnumber        # the current crl number
                                            # must be commented out to leave a V1 CRL
    crl             = $dir/crl.pem          # The current CRL
    private_key     = $dir/private/cakey.pem# The private key
    
    x509_extensions = usr_cert              # The extensions to add to the cert
    
    # Comment out the following two lines for the "traditional"
    # (and highly broken) format.
    name_opt        = ca_default            # Subject Name options
    cert_opt        = ca_default            # Certificate field options
    
    # Extension copying option: use with caution.
    # copy_extensions = copy
    
    # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
    # so this is commented out by default to leave a V1 CRL.
    # crlnumber must also be commented out to leave a V1 CRL.
    # crl_extensions        = crl_ext
    
    default_days    = 365                   # how long to certify for
    default_crl_days= 30                    # how long before next CRL
    default_md      = default               # use public key default MD
    preserve        = no                    # keep passed DN ordering
    
    # A few difference way of specifying how similar the request should look
    # For type CA, the listed attributes must be the same, and the optional
    # and supplied fields are just that :-)
    policy          = policy_match
    
    # For the CA policy
    [ policy_match ]
    countryName             = match
    stateOrProvinceName     = match
    organizationName        = match
    organizationalUnitName  = optional
    commonName              = supplied
    emailAddress            = optional
    
    # For the 'anything' policy
    # At this point in time, you must list all acceptable 'object'
    # types.
    [ policy_anything ]
    countryName             = optional
    stateOrProvinceName     = optional
    localityName            = optional
    organizationName        = optional
    organizationalUnitName  = optional
    commonName              = supplied
    emailAddress            = optional
    
    ####################################################################
    [ req ]
    default_bits            = 2048
    default_keyfile         = privkey.pem
    distinguished_name      = req_distinguished_name
    attributes              = req_attributes
    x509_extensions = v3_ca # The extensions to add to the self signed cert
    
    # Passwords for private keys if not present they will be prompted for
    # input_password = secret
    # output_password = secret
    
    # This sets a mask for permitted string types. There are several options.
    # default: PrintableString, T61String, BMPString.
    # pkix   : PrintableString, BMPString (PKIX recommendation before 2004)
    # utf8only: only UTF8Strings (PKIX recommendation after 2004).
    # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
    # MASK:XXXX a literal mask value.
    # WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
    string_mask = utf8only
    
    # req_extensions = v3_req # The extensions to add to a certificate request
    
    [ req_distinguished_name ]
    countryName                     = Country Name (2 letter code)
    countryName_default             = AU
    countryName_min                 = 2
    countryName_max                 = 2
    
    stateOrProvinceName             = State or Province Name (full name)
    stateOrProvinceName_default     = Some-State
    
    localityName                    = Locality Name (eg, city)
    
    0.organizationName              = Organization Name (eg, company)
    0.organizationName_default      = Internet Widgits Pty Ltd
    
    # we can do this but it is not needed normally :-)
    #1.organizationName             = Second Organization Name (eg, company)
    #1.organizationName_default     = World Wide Web Pty Ltd
    
    organizationalUnitName          = Organizational Unit Name (eg, section)
    #organizationalUnitName_default =
    
    commonName                      = Common Name (e.g. server FQDN or YOUR name)
    commonName_max                  = 64
    
    emailAddress                    = Email Address
    emailAddress_max                = 64
    
    # SET-ex3                       = SET extension number 3
    
    [ req_attributes ]
    challengePassword               = A challenge password
    challengePassword_min           = 4
    challengePassword_max           = 20
    
    unstructuredName                = An optional company name
    
    [ usr_cert ]
    
    # These extensions are added when 'ca' signs a request.
    
    # This goes against PKIX guidelines but some CAs do it and some software
    # requires this to avoid interpreting an end user certificate as a CA.
    
    basicConstraints=CA:FALSE
    
    # Here are some examples of the usage of nsCertType. If it is omitted
    # the certificate can be used for anything *except* object signing.
    
    # This is OK for an SSL server.
    # nsCertType                    = server
    
    # For an object signing certificate this would be used.
    # nsCertType = objsign
    
    # For normal client use this is typical
    # nsCertType = client, email
    
    # and for everything including object signing:
    # nsCertType = client, email, objsign
    
    # This is typical in keyUsage for a client certificate.
    # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    
    # This will be displayed in Netscape's comment listbox.
    nsComment                       = "OpenSSL Generated Certificate"
    
    # PKIX recommendations harmless if included in all certificates.
    subjectKeyIdentifier=hash
    authorityKeyIdentifier=keyid,issuer
    
    # This stuff is for subjectAltName and issuerAltname.
    # Import the email address.
    # subjectAltName=email:copy
    # An alternative to produce certificates that aren't
    # deprecated according to PKIX.
    # subjectAltName=email:move
    
    # Copy subject details
    # issuerAltName=issuer:copy
    
    #nsCaRevocationUrl              = http://www.domain.dom/ca-crl.pem
    #nsBaseUrl
    #nsRevocationUrl
    #nsRenewalUrl
    #nsCaPolicyUrl
    #nsSslServerName
    
    # This is required for TSA certificates.
    # extendedKeyUsage = critical,timeStamping
    
    [ v3_req ]
    
    # Extensions to add to a certificate request
    
    basicConstraints = CA:FALSE
    keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    
    [ v3_ca ]
    
    
    # Extensions for a typical CA
    
    
    # PKIX recommendation.
    
    subjectKeyIdentifier=hash
    
    authorityKeyIdentifier=keyid:always,issuer
    
    basicConstraints = critical,CA:true
    
    # Key usage: this is typical for a CA certificate. However since it will
    # prevent it being used as an test self-signed certificate it is best
    # left out by default.
    # keyUsage = cRLSign, keyCertSign
    
    # Some might want this also
    # nsCertType = sslCA, emailCA
    
    # Include email address in subject alt name: another PKIX recommendation
    # subjectAltName=email:copy
    # Copy issuer details
    # issuerAltName=issuer:copy
    
    # DER hex encoding of an extension: beware experts only!
    # obj=DER:02:03
    # Where 'obj' is a standard or added object
    # You can even override a supported extension:
    # basicConstraints= critical, DER:30:03:01:01:FF
    
    [ crl_ext ]
    
    # CRL extensions.
    # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
    
    # issuerAltName=issuer:copy
    authorityKeyIdentifier=keyid:always
    
    [ proxy_cert_ext ]
    # These extensions should be added when creating a proxy certificate
    
    # This goes against PKIX guidelines but some CAs do it and some software
    # requires this to avoid interpreting an end user certificate as a CA.
    
    basicConstraints=CA:FALSE
    
    # Here are some examples of the usage of nsCertType. If it is omitted
    # the certificate can be used for anything *except* object signing.
    
    # This is OK for an SSL server.
    # nsCertType                    = server
    
    # For an object signing certificate this would be used.
    # nsCertType = objsign
    
    # For normal client use this is typical
    # nsCertType = client, email
    
    # and for everything including object signing:
    # nsCertType = client, email, objsign
    
    # This is typical in keyUsage for a client certificate.
    # keyUsage = nonRepudiation, digitalSignature, keyEncipherment
    
    # This will be displayed in Netscape's comment listbox.
    nsComment                       = "OpenSSL Generated Certificate"
    
    # PKIX recommendations harmless if included in all certificates.
    subjectKeyIdentifier=hash
    authorityKeyIdentifier=keyid,issuer
    
    # This stuff is for subjectAltName and issuerAltname.
    # Import the email address.
    # subjectAltName=email:copy
    # An alternative to produce certificates that aren't
    # deprecated according to PKIX.
    # subjectAltName=email:move
    
    # Copy subject details
    # issuerAltName=issuer:copy
    
    #nsCaRevocationUrl              = http://www.domain.dom/ca-crl.pem
    #nsBaseUrl
    #nsRevocationUrl
    #nsRenewalUrl
    #nsCaPolicyUrl
    #nsSslServerName
    
    # This really needs to be in place for it to be a proxy certificate.
    proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
    
    ####################################################################
    [ tsa ]
    
    default_tsa = tsa_config1       # the default TSA section
    
    [ tsa_config1 ]
    
    # These are used by the TSA reply generation only.
    dir             = ./demoCA              # TSA root directory
    serial          = $dir/tsaserial        # The current serial number (mandatory)
    crypto_device   = builtin               # OpenSSL engine to use for signing
    signer_cert     = $dir/tsacert.pem      # The TSA signing certificate
                                            # (optional)
    certs           = $dir/cacert.pem       # Certificate chain to include in reply
                                            # (optional)
    signer_key      = $dir/private/tsakey.pem # The TSA private key (optional)
    signer_digest  = sha256                 # Signing digest to use. (Optional)
    default_policy  = tsa_policy1           # Policy if request did not specify it
                                            # (optional)
    other_policies  = tsa_policy2, tsa_policy3      # acceptable policies (optional)
    digests     = sha1, sha256, sha384, sha512  # Acceptable message digests (mandatory)
    accuracy        = secs:1, millisecs:500, microsecs:100  # (optional)
    clock_precision_digits  = 0     # number of digits after dot. (optional)
    ordering                = yes   # Is ordering defined for timestamps?
                                    # (optional, default: no)
    tsa_name                = yes   # Must the TSA name be included in the reply?
                                    # (optional, default: no)
    ess_cert_id_chain       = no    # Must the ESS cert id chain be included?
                                    # (optional, default: no)
    ess_cert_id_alg         = sha1  # algorithm to compute certificate
                                    # identifier (optional, default: sha1)
    [default_conf]
    ssl_conf = ssl_sect
    
    [ssl_sect]
    system_default = system_default_sect
    
    [system_default_sect]
    MinProtocol = TLSv1.2
    CipherString = DEFAULT@SECLEVEL=1
    
    • 4
  5. Алексей Агапов
    2022-07-31T08:22:29+08:002022-07-31T08:22:29+08:00

    对于任何系统,在顶部添加openssl.cnf:

    openssl_conf = default_conf
    

    并在结束时openssl.cnf:

    • 对于 Debian 添加:

      [system_default_sect]
      MinProtocol = TLSv1.0
      CipherString = DEFAULT@SECLEVEL=2
      
    • 对于 Ubuntu 20.04 添加:

      [system_default_sect]
      MinProtocol = TLSv1    #important !
      CipherString = DEFAULT@SECLEVEL=2 # in my case works good with very old software
      
    • 0

相关问题

  • 服务器的最佳rootkit删除工具?

  • 从 Ubuntu 中完全删除密钥环是否安全?

  • 如何从命令行仅安装安全更新?关于如何管理更新的一些提示

  • iptables 的图形用户界面?

  • 如何与无头服务器进行图形交互?

Sidebar

Stats

  • 问题 205573
  • 回答 270741
  • 最佳答案 135370
  • 用户 68524
  • 热门
  • 回答
  • Marko Smith

    如何运行 .sh 脚本?

    • 16 个回答
  • Marko Smith

    如何安装 .tar.gz(或 .tar.bz2)文件?

    • 14 个回答
  • Marko Smith

    如何列出所有已安装的软件包

    • 24 个回答
  • Marko Smith

    无法锁定管理目录 (/var/lib/dpkg/) 是另一个进程在使用它吗?

    • 25 个回答
  • Martin Hope
    Flimm 如何在没有 sudo 的情况下使用 docker? 2014-06-07 00:17:43 +0800 CST
  • Martin Hope
    Ivan 如何列出所有已安装的软件包 2010-12-17 18:08:49 +0800 CST
  • Martin Hope
    La Ode Adam Saputra 无法锁定管理目录 (/var/lib/dpkg/) 是另一个进程在使用它吗? 2010-11-30 18:12:48 +0800 CST
  • Martin Hope
    David Barry 如何从命令行确定目录(文件夹)的总大小? 2010-08-06 10:20:23 +0800 CST
  • Martin Hope
    jfoucher “以下软件包已被保留:”为什么以及如何解决? 2010-08-01 13:59:22 +0800 CST
  • Martin Hope
    David Ashford 如何删除 PPA? 2010-07-30 01:09:42 +0800 CST

热门标签

10.10 10.04 gnome networking server command-line package-management software-recommendation sound xorg

Explore

  • 主页
  • 问题
    • 最新
    • 热门
  • 标签
  • 帮助

Footer

AskOverflow.Dev

关于我们

  • 关于我们
  • 联系我们

Legal Stuff

  • Privacy Policy

Language

  • Pt
  • Server
  • Unix

© 2023 AskOverflow.DEV All Rights Reserve