Re: [nfsv4] openssl s_client patch for RPC starttls

Benjamin Coddington <bcodding@redhat.com> Thu, 14 October 2021 10:53 UTC

Return-Path: <bcodding@redhat.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE2E13A1347 for <nfsv4@ietfa.amsl.com>; Thu, 14 Oct 2021 03:53:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.553
X-Spam-Level:
X-Spam-Status: No, score=-2.553 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zfTaSHPq-4XC for <nfsv4@ietfa.amsl.com>; Thu, 14 Oct 2021 03:53:33 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0C153A13AD for <nfsv4@ietf.org>; Thu, 14 Oct 2021 03:53:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1634208801; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=PgmXHICNEyUPF7i319+zdGcdfW5oxcjBdSq+KtBGG58=; b=i/wKj0c/X4IfUphmnsjzVUZM9aTJ0zhh6F2An8ZYRq8dlfAsP7vPmPQi7kOZKtL0Vekfyx v+Ztu8BNXRfz6jDbxS4C/+mVu1/EnMv95eYq8xyUK5KA8kYACiED3lpvuBOcvHaKJxP1kS gA/yhfs5lDuBEmsVdcdK+KnbQQ9OTe4=
Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-381-vKSUrb84MiqqiocMSRiFxg-1; Thu, 14 Oct 2021 06:53:18 -0400
X-MC-Unique: vKSUrb84MiqqiocMSRiFxg-1
Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 0891018D6A2C for <nfsv4@ietf.org>; Thu, 14 Oct 2021 10:53:17 +0000 (UTC)
Received: from [172.16.176.1] (ovpn-64-2.rdu2.redhat.com [10.10.64.2]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C96825BAE6 for <nfsv4@ietf.org>; Thu, 14 Oct 2021 10:53:16 +0000 (UTC)
From: Benjamin Coddington <bcodding@redhat.com>
To: NFSv4 <nfsv4@ietf.org>
Date: Thu, 14 Oct 2021 06:53:15 -0400
Message-ID: <D2A4A5C5-BC45-422A-963E-99C89A7DC49A@redhat.com>
In-Reply-To: <FC2C59AC-2B78-4F4D-A44D-BB8CBED56990@redhat.com>
References: <FC2C59AC-2B78-4F4D-A44D-BB8CBED56990@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=bcodding@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; format="flowed"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/Y8cg4GpAPVKLM8jRogfGYUK_NLg>
Subject: Re: [nfsv4] openssl s_client patch for RPC starttls
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Oct 2021 10:53:46 -0000

On 13 Oct 2021, at 16:15, Benjamin Coddington wrote:

> I often inspect TLS certificates and session parameters using 
> openssl's
> s_client app, so I've hacked up a patch that allows the s_client app 
> to use
> "-starttls rpc" for servers that have a working implementation.  I 
> thought
> I'd share it here as it might be useful:
>
> https://github.com/bcodding/openssl/commit/4759096e12e8ff9e60bb340677d43d5e4ec0a740
>
> It would be nice to know if it works to display certificates and 
> parameters
> against a freebsd server or other implementations.  I was able to test 
> this
> against Tigran's dcache-nfs-lab server that is still up on the VPN.

Rick pointed out that I had the request wired up incorrectly.  This 
version
of the patch has the correction in it:

https://github.com/bcodding/openssl/commit/9bf2c4d66eac

Thanks Rick!
Ben