From nobody Fri Nov 17 17:13:06 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SX3Pv02Qjz51B2t for ; Fri, 17 Nov 2023 17:13:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SX3Pt56bYz4SSg for ; Fri, 17 Nov 2023 17:13:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1700241186; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Zcfrs7rRj8e/IzvCy48eJJblALigXckQbYYc124XMHY=; b=INP656305F2WtlG5dgwMr7Fqe2gueKsXtXa16Pd0n86WL53G49OYV03OYQfMAxjbZ/n1Sl cRncGBdqWUjMSZHXQ/th7JgyBakCmtiO0YAtTjJvUgLz95au6AEv3RKjSVY9RHJnXb33Eg CCVi1sLttExbj5m7phpo8o6GvLcmJjFMMj1R00mcDAmVQdLsWe2/ca0BOnE5IhT8WfjivJ AT6+wjC2qpZoGhnafYGUxmwD6e3lz0uau8MJeakl+OPnBYYk4OlLw59EDNXHa1NQiinzuS JXSHONq5iQgguv0p3aLQGqebyhknQKN8mKkmdkW61I4hbVd7wzhQh9Qkenrf2g== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1700241186; a=rsa-sha256; cv=none; b=TG+9qwiNnyMKC2JUEbAzg3tlxgftpp+R2nWW8ngmRZ5hjB2orxyidJKdeRlBLxXAnftlor NOcCASUaQ2QMqsQOnmWbDC0bp9xPTJr9vRGmfNwXltONUeDRM0gI+vrjtQpwzYmCmqhJ8m KsHXrhTYfjfaAOLgFNR/duML/6o07Rfg/Xz/KP+rSV8r67WYj76/v3ZsMGjvYZEggytQi3 hGwy1JJNp8pMY2fj1J5ko4hJym7LYDOrtrXctYIGVAXMQBKhV9WbXo6xDnQL+kP/4zHek0 vHccxFiUjIsgrpQZWqthEzD2YzWwkWim7NhE4nSjZ2/vjc7/Acb4rv7J+PVPTA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SX3Pt4C65zrrg for ; Fri, 17 Nov 2023 17:13:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3AHHD6k6054085 for ; Fri, 17 Nov 2023 17:13:06 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3AHHD62U054084 for bugs@FreeBSD.org; Fri, 17 Nov 2023 17:13:06 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT Date: Fri, 17 Nov 2023 17:13:06 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: Joerg.Pulz@frm2.tum.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272835 --- Comment #1 from Joerg Pulz --- Created attachment 246375 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D246375&action= =3Dedit patch to fix base heimdal with openssl-3.x Found some time to do further research. rc4 and other weak crypto is covered by the OpenSSL legacy provider which is not loaded by default. Adding the missing parts to explicitly load the legacy provider at the right places fixes this PR. Changes in crypto/heimdal/lib/krb5/salt.c make kinit(8) work. Changes in crypto/heimdal/lib/krb5/crypto.c make using the TGT and obtaining service tickets work. Would be nice to see this in the tree and MFC'd to 14. --=20 You are receiving this mail because: You are the assignee for the bug.=