asf-tooling opened a new issue, #1123:
URL: https://github.com/apache/tooling-trusted-releases/issues/1123

   **ASVS Level(s):** L2
   
   **Description:**
   
   ### Summary
   The Apache TLS configuration uses `SSLHonorCipherOrder off`, which allows 
the client to choose the cipher suite from the server's offered list. ASVS 
12.1.2 states cipher suites should have 'the strongest cipher suites set as 
preferred.' With client-side preference, a client could select a 128-bit AES 
cipher over a 256-bit cipher, or a DHE fallback over ECDHE. However, the 
practical security impact is minimal because all listed cipher suites provide 
forward secrecy (meeting L3 requirements), all use AEAD modes (AES-GCM or 
ChaCha20-Poly1305), no weak or legacy ciphers are present in the suite, and 
this matches Mozilla's current 'Intermediate' configuration guidance.
   
   ### Details
   In `tooling-vm-ec2-de.apache.org.yaml` and 
`atr/docs/tls-security-configuration.md`, the configuration uses 
`SSLHonorCipherOrder off`. The documentation explicitly justifies this choice 
for mobile device optimization (ChaCha20 selection). This finding reflects a 
strict reading of the ASVS requirement rather than a practical security concern.
   
   ### Recommended Remediation
   If strict ASVS L2 compliance is required, enable server cipher preference 
with strongest ciphers first:
   
   ```apache
   SSLHonorCipherOrder on
   SSLCipherSuite 
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256
   ```
   
   **Note:** Mozilla's current 'Intermediate' configuration (used by millions 
of sites) also uses `SSLHonorCipherOrder off`. The current configuration 
represents industry best practice. If you choose to enable server preference, 
verify mobile client compatibility (ChaCha20 performance). Consider accepting 
this as a documented exception with business justification: 'Client preference 
enabled to optimize mobile performance per Mozilla Intermediate profile.'
   
   ### Acceptance Criteria
   - [ ] Server cipher preference enabled OR risk acceptance documented
   - [ ] Mobile client compatibility verified (if enabling server preference)
   - [ ] Documentation updated with justification
   - [ ] Unit tests verify cipher suite configuration
   
   ### References
   - Source reports: L2:12.1.2.md
   - Related findings: None
   - ASVS sections: 12.1.2
   
   ### Priority
   Low
   
   ---


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to