On 8/19/19 3:19 PM, Kurt Roeckx wrote:
On Mon, Aug 19, 2019 at 02:57:14PM -0700, nbi wrote:
Package: libssl1.0.0,libssl1.0.2,libssl1.1,openssl
Version:
libssl1.0.0 1.0.2l-1~bpo8+1
libssl1.0.2 1.0.2q-2
libssl1.1 1.1.1c-1
openssl 1.1.1c-1
After booting a distribution (sparkylinux.org) based on "testing" everything
appears to be working correctly. Browsers and email clients access their destinations
without
perceptible delay regardless of whether the connection is secure or not.
However after some extended web usage (I often see this problem after about an
hour of web surfing)
browsers get stuck on TLS connections. This problem has existed since the
beginning of June, i.e. Buster and testing since Buster. It does not happen
with Debian Stretch.
I first saw this with Firefox Quantum and assumed it was a Firefox specific
problem however none of the purported solutions solved this problem. I then
realized that it
also happens with Chrome. Worse yet, even the Thunderbird email client is
affected. The messages for each:
Firefox: performing TLS handshake
Chrome: establishing secure connection
Thunderbird: cannot establish secure connection
Basically the browsers get stuck on the TLS handshake. This seemingly gets
worse as time goes on. After boot up these messages fly by so quickly they're
barely perceptible.
Eventually the handshakes take seconds. At some point the bowsers become
unusable as the handshake seems to time out.
I repeated the testing with the very latest versions of both Firefox and Chrome on both
sparkylinux ("testing") and Debian Stretch. This problem does not happen on
Stretch.
The evidence suggests it's distribution version specific. The above ssl library
components changed from Stretch to Buster. Since the browsers utilize these
components for
TLS handshakes it stands to reason this is either a regression or new bug in
these ssl components.
Neither Firefox nor Chrome makes use of openssl. Firefox makes use
of NSS (libnss3). Chrome makes use of boringssl, but neither
Chrome nor boringssl is part of Debian. Chromium has an embeded
copy of boringssl.
I don't understand how all these apps can experience the same problem
without using a shared component for the TLS handshakes. That would just
be too coincidental, no?
boringssl is a fork of Openssl. So is it possible that some of the
problems that existed in Openssl were carried forward to boringssl
without correction?
What they all do have in common is that they now support TLS 1.3,
but I currently don't see how that should have any effect. Is the
whole PC slower, or the browsers, or just the connection? And a
reboot solves the problem?
As I reported just the TLS handshake. Other parts of the connection
sequence take on the order of milliseconds as usual. PC and other apps
are fine. Yes, reboot solves the problem although only temporarily. Also
as mentioned this doesn't happen with Stretch. Maybe the regression or
new bug were introduced with newer versions of libboringssl and libnss3 ?
Did you try to look at network traffic with something like
wireshark?
And what am I looking for? You're suggesting that I'm the first person
to report this problem? I've already spent far too much time on this
issue and now you're asking me an end user to spend even more time on
this issue? I don't mind helping, but it needs to be within reason. In
this case having specific things to look for would be most helpful.
Kurt