On Sun, Jan 26, 2020 at 06:38:59PM -0500, George Koehler wrote:
> To OpenBSD ports list and MAINTAINER Amit Kulkarni,
> 
> After I did sysupgrade today, Sylpheed can't connect to imap.gmail.com.
> It uses TLSv1.3 (sylpheed --debug) and shows a dialog box with a
> self-signed certificate for an invalid host.  The cert tells me to
> enable SNI in my client.  I then reject the certificate.  Recent changes
> in OpenBSD seem to have enabled TLSv1.3 in libssl.
> 
> I fixed it with this patch from Sylpheed's bug tracker, also in Debian:
> https://sources.debian.org/patches/sylpheed/3.7.0-5/0009-support-SNI-for-IMAP.patch/
> 
> Amit, I see that you have GMail; does your Sylpheed work?
> 
> This isn't where I expected to make my first commit,
> but is this OK to commit?

I'd prefer if you added an error check to this diff, something like:

        if (!SSL_set_tlsext_host_name(sockinfo->ssl, sockinfo->hostname)) {
                g_warning(_("Error setting servername extension\n"));
                return FALSE;
        }

With that it's ok tb

PS: The feature guards seem a bit pointleess.  SSL_CTRL_SET_TLSEXT_HOSTNAME
exists since the mid-2000s at least. Support for OPENSSL_NO_TLSEXT was
removed a long time ago both in LibreSSL and OpenSSL.

Reply via email to