Closed 1div0 closed 3 weeks ago
Yet another crash. This time_t with the Brave updater served by AWS.
New TCP connection #4190: Pascal(57360) <-> ec2-52-37-203-8.us-west-2.compute.amazonaws.com(443) 4190 1 0.2135 (0.2135) C>S Handshake ClientHello Version 3.3 resume [32]= 4f ba 85 f6 ab 2c 27 72 59 79 61 2d ec bd 9a 43 57 b5 68 63 e3 06 a0 54 19 e2 2e 64 06 92 ee 36 cipher suites GREASE 0xAAAA TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA compression methods NULL extensions signed_certificate_timestamp signature_algorithms key_share renegotiation_info extended_master_secret supported_versions version: 218.218 version: 3.4 version: 3.3 ec_point_formats ec point format uncompressed
status_request
session_ticket
compress_certificate
application_layer_protocol_negotiation
psk_key_exchange_modes
server_name
host_name: go-updater.brave.com
supported_groups
supported group
Short read: -20 bytes available (expecting 2) 4190 2 0.4326 (0.2191) S>C Handshake ServerHello Version 3.3 session_id[32]= 4f ba 85 f6 ab 2c 27 72 59 79 61 2d ec bd 9a 43 57 b5 68 63 e3 06 a0 54 19 e2 2e 64 06 92 ee 36 cipherSuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 compressionMethod NULL extensions ec_point_formats renegotiation_info application_layer_protocol_negotiation extended_master_secret buffer overflow detected : terminated
So I can reliably crash the ssldump by entering https://go-updater.brave.com/ in the browser address bar now, even on F40.
New TCP connection #115: Pascal(37648) <-> ec2-44-224-90-130.us-west-2.compute.amazonaws.com(443) 115 1 0.2162 (0.2162) C>S Handshake ClientHello Version 3.3 resume [32]= 35 8d ab 53 06 fb 5b 21 3f 4a 67 a6 23 4e d2 02 f3 4a 58 27 b0 e2 03 eb b3 7d 93 0a 97 3e 5e 61 cipher suites GREASE 0xDADA TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA compression methods NULL extensions ec_point_formats ec point format uncompressed
compress_certificate
key_share
signature_algorithms
server_name
host_name: go-updater.brave.com
extended_master_secret
supported_versions
version: 122.122
version: 3.4
version: 3.3
signed_certificate_timestamp
application_layer_protocol_negotiation
psk_key_exchange_modes
renegotiation_info
supported_groups
supported group
Short read: -36940 bytes available (expecting 2) 115 2 0.4324 (0.2161) S>C Handshake ServerHello Version 3.3 session_id[32]= 35 8d ab 53 06 fb 5b 21 3f 4a 67 a6 23 4e d2 02 f3 4a 58 27 b0 e2 03 eb b3 7d 93 0a 97 3e 5e 61 cipherSuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 compressionMethod NULL extensions ec_point_formats renegotiation_info application_layer_protocol_negotiation extended_master_secret buffer overflow detected : terminated
This time_t w/ stack dump.
New TCP connection #75: Pascal(47082) <-> ec2-35-165-224-233.us-west-2.compute.amazonaws.com(443) 75 1 0.2128 (0.2128) C>S Handshake ClientHello Version 3.3 resume [32]= 2c 72 d4 b0 da 0d 31 3f a7 5c 0c 97 d3 31 15 6c a6 9c 2c b5 58 70 61 f1 84 ae c1 55 ef 98 b4 dd cipher suites GREASE 0xBABA TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA compression methods NULL extensions signed_certificate_timestamp ec_point_formats ec point format uncompressed
extended_master_secret
signature_algorithms
status_request
session_ticket
supported_groups
supported group
Short read: -47728 bytes available (expecting 2) 75 2 0.4319 (0.2191) S>C Handshake ServerHello Version 3.3 session_id[32]= 2c 72 d4 b0 da 0d 31 3f a7 5c 0c 97 d3 31 15 6c a6 9c 2c b5 58 70 61 f1 84 ae c1 55 ef 98 b4 dd cipherSuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 compressionMethod NULL extensions ec_point_formats renegotiation_info application_layer_protocol_negotiation extended_master_secret buffer overflow detected : terminated
Program received signal SIGABRT, Aborted.
__pthread_kill_implementation (threadid=
keyp=keyp@entry=0x7fffffffc868, keyl=keyl@entry=0x7fffffffc860) at /usr/src/debug/ssldump-1.8-2.fc40.x86_64/ssl/ssldecode.c:547
data=data@entry=0x7fffffffc980) at /usr/src/debug/ssldump-1.8-2.fc40.x86_64/ssl/sslprint.c:230
data=data@entry=0x7fffffffcac0) at /usr/src/debug/ssldump-1.8-2.fc40.x86_64/ssl/sslprint.c:230
tp_mac=<optimized out>, tp_snaplen=222, tp_sec=1722858922, tp_usec=757006, tp_vlan_tci_valid=0, tp_vlan_tci=0, tp_vlan_tpid=33024) at ./pcap-linux.c:4076
case TLSV13_VERSION seems to be missing in action at https://github.com/adulau/ssldump/blob/f24cf1476c2634e96b9d74d1d71c6c29fc820510/ssl/ssldecode.c#L558
Thanks for the report. This should be fixed in https://github.com/adulau/ssldump/releases/tag/v1.9 - let us know if you have any issues.
I have repeatedly observed the crash with suspicious console output:
Short read: -48141 bytes available (expecting 2)
F39 1.8-1
Log and relevant packet capture attached. SSLdump.log Cloudflare.pcapng.gz