<div dir="auto">Sorry, I should have made it clear before.<div dir="auto"><br></div><div dir="auto">I've tried putting the string in both /etc/gnutls/config and /etc/gnutls/default-priorites according to the docs I found but, neither worked.</div><div dir="auto"><br></div><div dir="auto">Thanks,</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Jan 26, 2020, 17:18 Brandon Sawyers <<a href="mailto:brandor5@gmail.com">brandor5@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto">Thanks for the help.<div dir="auto"><br></div><div dir="auto">We are already in the process of updating so of the certs. Thanks for the reminder.</div><div dir="auto"><br></div><div dir="auto">Now I just need to figure out how to have the priority strong apply system wide instead of just gnutls-cli.</div><div dir="auto"><br></div><div dir="auto">Any tips there?</div><div dir="auto"><br></div><div dir="auto">Thanks again,</div><div dir="auto">Brandon</div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Jan 26, 2020, 16:56 Dimitri John Ledkov <<a href="mailto:xnox@ubuntu.com" target="_blank" rel="noreferrer">xnox@ubuntu.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Thu, 23 Jan 2020 at 12:16, Dimitri John Ledkov <<a href="mailto:xnox@ubuntu.com" rel="noreferrer noreferrer" target="_blank">xnox@ubuntu.com</a>> wrote:<br>
><br>
> On Thu, 23 Jan 2020 at 14:01, Nikos Mavrogiannopoulos <<a href="mailto:nmav@gnutls.org" rel="noreferrer noreferrer" target="_blank">nmav@gnutls.org</a>> wrote:<br>
> ><br>
> > On Wed, Jan 22, 2020 at 3:42 PM Brandon Sawyers <<a href="mailto:brandor5@gmail.com" rel="noreferrer noreferrer" target="_blank">brandor5@gmail.com</a>> wrote:<br>
> > ><br>
> > > Hello everyone:<br>
> > ><br>
> > > A recent package upgrade in ubuntu 1604 (v3.4.10-4ubuntu1.6) and 1804 (v3.5.18-1ubuntu1.2) has left us without SHA1 support. Since we are still in the process of migrating our last services off of SHA1 with a target date of April this has put us in a pickle.<br>
> > ><br>
> > > From reading the docs I expect I should be able to use priority and allow SHA1 to function, however making this work has been rather frustrating.<br>
> > ><br>
> > > I've tried several different versions of the following command but I would expect just having "NORMAL:+SIGN-RSA-SHA1:+SHA1" priority set should work.<br>
> > ><br>
> > > `gnutls-bin --x509cafile ./cachain-with-sha1-signed-cert.pem --priority='NORMAL:+SIGN-RSA-SHA1:+SHA1' -p 636 <a href="http://internal.directory.org" rel="noreferrer noreferrer noreferrer" target="_blank">internal.directory.org</a>`<br>
> ><br>
> > Have you tried appending %VERIFY_ALLOW_SIGN_WITH_SHA1? The available<br>
> > priority strings are documented in:<br>
> > <a href="https://gnutls.org/manual/html_node/Priority-Strings.html" rel="noreferrer noreferrer noreferrer" target="_blank">https://gnutls.org/manual/html_node/Priority-Strings.html</a><br>
> ><br>
><br>
> From what I can tell is that the backports do not include that<br>
> flag.... I'm escalating this, as this is regression-security as I do<br>
> not believe that upstream code is affected as this is an issue in the<br>
> patch set released in ubuntu.<br>
><br>
> I hope to move this discussion downstream to<br>
> <a href="https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1860656" rel="noreferrer noreferrer noreferrer" target="_blank">https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1860656</a><br>
><br>
<br>
To close this out, a further update got published to the affected<br>
releases which adds support to use "%VERIFY_ALLOW_BROKEN" and<br>
"%VERIFY_ALLOW_SIGN_WITH_SHA1" in the priority string option, allowing<br>
one to re-enable obsoleted hashes in certificate signatures.<br>
<br>
But please upgrade your certificates to use SHA256 nonetheless as<br>
progressively more software will start outright reject SHA1<br>
certificates without a way to turn them back on.<br>
<br>
-- <br>
Regards,<br>
<br>
Dimitri.<br>
</blockquote></div>
</blockquote></div>