#8214: openssl-1.1.0
-------------------------+-----------------------
Reporter: renodr | Owner: renodr
Type: enhancement | Status: assigned
Priority: low | Milestone: hold
Component: BOOK | Version: SVN
Severity: normal | Resolution:
Keywords: |
-------------------------+-----------------------
Comment (by dj@…):
Replying to [comment:6 renodr]:
> I'll take this challenge on. The SWEET32 issue needs to be mitigated.
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
OpenSSL folks rated it low priority in the above review. I'm inclined to
agree with their assessment given the amount of data required (and default
configs of both httpd and nginx). I do not like the fix in 1.1.0. In the
interim, we could safely follow the same approach as upstream until 1.0.2i
is released if it is still a concern:
https://github.com/openssl/openssl/commit/0fff5065884d5ac61123a604bbcee30a53c808ff
The above classifies it as MEDIUM instead of HIGH. Optionally, we could
move it to WEAK but still build 3DES via the enable-weak-ssl-ciphers
switch (I don't like this).
When we do upgrade to 1.1.0, do we want to include 3DES anyway? Probably
going to break some existing configs if not (which should be updated if
not cost prohibitive). If not undoing the change in favor of the one for
1.0.2, at very least, the switch should be mentioned in command
explanations. For reference, here is the 1.1.0 change (make it WEAK and
not built by default):
https://github.com/openssl/openssl/commit/d33726b92e09605a088369d0e01c99d138c0524f
Regarding Sweet32, no need to do anything with httpd or nginx configs for
now. It is mathematically impossible to exploit using this method in the
default configuration for both (maximum requests at 100).
--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/8214#comment:9>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
--
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page