On Mon, Jan 27, 2020 at 12:05:47PM +1100, Theo Buehler wrote:
> On Sun, Jan 26, 2020 at 06:38:59PM -0500, George Koehler wrote:
> > To OpenBSD ports list and MAINTAINER Amit Kulkarni,
> > 
> > After I did sysupgrade today, Sylpheed can't connect to imap.gmail.com.
> > It uses TLSv1.3 (sylpheed --debug) and shows a dialog box with a
> > self-signed certificate for an invalid host.  The cert tells me to
> > enable SNI in my client.  I then reject the certificate.  Recent changes
> > in OpenBSD seem to have enabled TLSv1.3 in libssl.
> > 
> > I fixed it with this patch from Sylpheed's bug tracker, also in Debian:
> > https://sources.debian.org/patches/sylpheed/3.7.0-5/0009-support-SNI-for-IMAP.patch/
> > 
> > Amit, I see that you have GMail; does your Sylpheed work?
> > 
> > This isn't where I expected to make my first commit,
> > but is this OK to commit?
> 
> I'd prefer if you added an error check to this diff, something like:
> 
>       if (!SSL_set_tlsext_host_name(sockinfo->ssl, sockinfo->hostname)) {
>               g_warning(_("Error setting servername extension\n"));

Sorry, without the _()

>               return FALSE;
>       }
> 
> With that it's ok tb
> 
> PS: The feature guards seem a bit pointleess.  SSL_CTRL_SET_TLSEXT_HOSTNAME
> exists since the mid-2000s at least. Support for OPENSSL_NO_TLSEXT was
> removed a long time ago both in LibreSSL and OpenSSL.
> 

Reply via email to