public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Re: URGENT - Re: IPFire 2.27 - Core Update 175 released
       [not found] <69077BB2-BE26-4FE1-A861-F244C9128427@ipfire.org>
@ 2023-06-14 16:55 ` Michael Tremer
  0 siblings, 0 replies; 3+ messages in thread
From: Michael Tremer @ 2023-06-14 16:55 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 4145 bytes --]

Hello Jon,

Well, technically yes. We could simply create an “add-on” which makes the required change and then disappears after it has been installed once.

However, that would probably be a lot of hassle for only very few users actually installing it. So I won’t go down this route.

So far we didn’t have any complaints which means that we caught the problem quick enough for most people not noticing a thing.

Best,
-Michael

> On 12 Jun 2023, at 15:46, jon <jon.murphy(a)ipfire.org> wrote:
> 
> 
> For a quick update, is it possible to create a "quick_update" add-on script?  
> 
> User installs the pakfire "quick_update" add-on and the install.sh does a quick patch.  It only executes the code in the install.sh if the patch is needed.
> 
> 
> Jon Murphy
> jon.murphy(a)ipfire.org
> 
> 
> 
>> On Jun 12, 2023, at 9:01 AM, Michael Tremer <michael.tremer(a)ipfire.org> wrote:
>> 
>> Hello Adolf,
>> 
>>> On 12 Jun 2023, at 13:43, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>> 
>>> Hi Michael,
>>> 
>>> I am afraid somehow I made an error with the last patch I provided. I was sure I transferred the ovpnmain.cgi file from my virtual testbed system and created the patch for bug#13137 from that.
>>> 
>>> However after upgrading the virtual machines I am finding that the legacy bits are not being applied to legacy certs but to openssl-3.x certs.
>>> 
>>> It looks like I submitted the subroutine iscertlegacy from ovpnmain.cgi with the return values the wrong way round.
>>> 
>>> 
>>> The sub routine was issued like
>>> 
>>> sub iscertlegacy
>>> {
>>>        my $file=$_[0];
>>>        my @certinfo = &General::system_output("/usr/bin/openssl", "pkcs12", "-info", "-nodes",
>>>        "-in", "$file.p12", "-noout", "-passin", "pass:''");
>>>        if (index ($certinfo[0], "MAC: sha1") != -1) {
>>>                return 0;
>>>        }
>>>        return 1;
>>> }
>>> 
>>> but it should have been
>>> 
>>> sub iscertlegacy
>>> {
>>>        my $file=$_[0];
>>>        my @certinfo = &General::system_output("/usr/bin/openssl", "pkcs12", "-info", "-nodes",
>>>        "-in", "$file.p12", "-noout", "-passin", "pass:''");
>>>        if (index ($certinfo[0], "MAC: sha1") != -1) {
>>>                return 1;
>>>        }
>>>        return 0;
>>> }
>>> 
>>> I don't know how I managed to do that error but I did.
>> 
>> No reason to panic. The good thing is that everything will continue working unless people edit their connections.
>> 
>> I have taken your change and committed it:
>> 
>>  https://git.ipfire.org/?p=ipfire-2.x.git;a=commitdiff;h=0ebb271d1ec8b68f73dbd396b0f3a0aa4a50a501
>> 
>>> How can we deal with that now?
>> 
>> I will start a build and as soon as that is done, I will replace the updater.
>> 
>> Then there is the problem with the installation images. Replacing those is painful and therefore I am not going to do it. The chaos wouldn’t be worth it. Because generally creating connections on a new system and importing it to any other that is properly patched (or a new one that isn’t patched) should be working fine.
>> 
>> That only leaves us with a very small amount of people being affected by this in real terms. For those we will have to ship this change again with the next update and then everything is cool.
>> 
>> So, no need to panic. Bugs happen. We had a review process and didn’t catch it. That’s why we have updates :)
>> 
>> -Michael
>> 
>>> 
>>> Sorry,
>>> Adolf.
>>> 
>>> 
>>> On 12/06/2023 12:45, IPFire Project wrote:
>>>> IPFire Logo
>>>> there is a new post from Michael Tremer on the IPFire Blog:
>>>> *IPFire 2.27 - Core Update 175 released*
>>>>   Finally, the next update, IPFire 2.27 - Core Update 175, has been released! It updates OpenSSL to the 3.1 branch, features a kernel update as well as a large number of package updates and a variety of bug fixes.
>>>> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-175-released>
>>>> The IPFire Project
>>>> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.
> 
> 


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: URGENT - Re: IPFire 2.27 - Core Update 175 released
  2023-06-12 12:43 ` Adolf Belka
@ 2023-06-12 14:01   ` Michael Tremer
  0 siblings, 0 replies; 3+ messages in thread
From: Michael Tremer @ 2023-06-12 14:01 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 3071 bytes --]

Hello Adolf,

> On 12 Jun 2023, at 13:43, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> 
> Hi Michael,
> 
> I am afraid somehow I made an error with the last patch I provided. I was sure I transferred the ovpnmain.cgi file from my virtual testbed system and created the patch for bug#13137 from that.
> 
> However after upgrading the virtual machines I am finding that the legacy bits are not being applied to legacy certs but to openssl-3.x certs.
> 
> It looks like I submitted the subroutine iscertlegacy from ovpnmain.cgi with the return values the wrong way round.
> 
> 
> The sub routine was issued like
> 
> sub iscertlegacy
> {
>         my $file=$_[0];
>         my @certinfo = &General::system_output("/usr/bin/openssl", "pkcs12", "-info", "-nodes",
>         "-in", "$file.p12", "-noout", "-passin", "pass:''");
>         if (index ($certinfo[0], "MAC: sha1") != -1) {
>                 return 0;
>         }
>         return 1;
> }
> 
> but it should have been
> 
> sub iscertlegacy
> {
>         my $file=$_[0];
>         my @certinfo = &General::system_output("/usr/bin/openssl", "pkcs12", "-info", "-nodes",
>         "-in", "$file.p12", "-noout", "-passin", "pass:''");
>         if (index ($certinfo[0], "MAC: sha1") != -1) {
>                 return 1;
>         }
>         return 0;
> }
> 
> I don't know how I managed to do that error but I did.

No reason to panic. The good thing is that everything will continue working unless people edit their connections.

I have taken your change and committed it:

  https://git.ipfire.org/?p=ipfire-2.x.git;a=commitdiff;h=0ebb271d1ec8b68f73dbd396b0f3a0aa4a50a501

> How can we deal with that now?

I will start a build and as soon as that is done, I will replace the updater.

Then there is the problem with the installation images. Replacing those is painful and therefore I am not going to do it. The chaos wouldn’t be worth it. Because generally creating connections on a new system and importing it to any other that is properly patched (or a new one that isn’t patched) should be working fine.

That only leaves us with a very small amount of people being affected by this in real terms. For those we will have to ship this change again with the next update and then everything is cool.

So, no need to panic. Bugs happen. We had a review process and didn’t catch it. That’s why we have updates :)

-Michael

> 
> Sorry,
> Adolf.
> 
> 
> On 12/06/2023 12:45, IPFire Project wrote:
>> IPFire Logo
>> there is a new post from Michael Tremer on the IPFire Blog:
>> *IPFire 2.27 - Core Update 175 released*
>>    Finally, the next update, IPFire 2.27 - Core Update 175, has been released! It updates OpenSSL to the 3.1 branch, features a kernel update as well as a large number of package updates and a variety of bug fixes.
>> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-175-released>
>> The IPFire Project
>> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.


^ permalink raw reply	[flat|nested] 3+ messages in thread

* URGENT - Re: IPFire 2.27 - Core Update 175 released
       [not found] <168656670763.3173477.15681266236887825485.ipfire@ipfire.org>
@ 2023-06-12 12:43 ` Adolf Belka
  2023-06-12 14:01   ` Michael Tremer
  0 siblings, 1 reply; 3+ messages in thread
From: Adolf Belka @ 2023-06-12 12:43 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1945 bytes --]

Hi Michael,

I am afraid somehow I made an error with the last patch I provided. I was sure I transferred the ovpnmain.cgi file from my virtual testbed system and created the patch for bug#13137 from that.

However after upgrading the virtual machines I am finding that the legacy bits are not being applied to legacy certs but to openssl-3.x certs.

It looks like I submitted the subroutine iscertlegacy from ovpnmain.cgi with the return values the wrong way round.


The sub routine was issued like

  sub iscertlegacy
  {
          my $file=$_[0];
          my @certinfo = &General::system_output("/usr/bin/openssl", "pkcs12", "-info", "-nodes",
          "-in", "$file.p12", "-noout", "-passin", "pass:''");
          if (index ($certinfo[0], "MAC: sha1") != -1) {
                  return 0;
          }
          return 1;
  }

but it should have been

  sub iscertlegacy
  {
          my $file=$_[0];
          my @certinfo = &General::system_output("/usr/bin/openssl", "pkcs12", "-info", "-nodes",
          "-in", "$file.p12", "-noout", "-passin", "pass:''");
          if (index ($certinfo[0], "MAC: sha1") != -1) {
                  return 1;
          }
          return 0;
  }

I don't know how I managed to do that error but I did.

How can we deal with that now?

Sorry,
Adolf.


On 12/06/2023 12:45, IPFire Project wrote:
> IPFire Logo
> 
> there is a new post from Michael Tremer on the IPFire Blog:
> 
> *IPFire 2.27 - Core Update 175 released*
> 
>     Finally, the next update, IPFire 2.27 - Core Update 175, has been released! It updates OpenSSL to the 3.1 branch, features a kernel update as well as a large number of package updates and a variety of bug fixes.
> 
> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-175-released>
> 
> The IPFire Project
> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.
> 

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2023-06-14 16:55 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <69077BB2-BE26-4FE1-A861-F244C9128427@ipfire.org>
2023-06-14 16:55 ` URGENT - Re: IPFire 2.27 - Core Update 175 released Michael Tremer
     [not found] <168656670763.3173477.15681266236887825485.ipfire@ipfire.org>
2023-06-12 12:43 ` Adolf Belka
2023-06-12 14:01   ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox