asf-tooling opened a new issue, #1123: URL: https://github.com/apache/tooling-trusted-releases/issues/1123
**ASVS Level(s):** L2 **Description:** ### Summary The Apache TLS configuration uses `SSLHonorCipherOrder off`, which allows the client to choose the cipher suite from the server's offered list. ASVS 12.1.2 states cipher suites should have 'the strongest cipher suites set as preferred.' With client-side preference, a client could select a 128-bit AES cipher over a 256-bit cipher, or a DHE fallback over ECDHE. However, the practical security impact is minimal because all listed cipher suites provide forward secrecy (meeting L3 requirements), all use AEAD modes (AES-GCM or ChaCha20-Poly1305), no weak or legacy ciphers are present in the suite, and this matches Mozilla's current 'Intermediate' configuration guidance. ### Details In `tooling-vm-ec2-de.apache.org.yaml` and `atr/docs/tls-security-configuration.md`, the configuration uses `SSLHonorCipherOrder off`. The documentation explicitly justifies this choice for mobile device optimization (ChaCha20 selection). This finding reflects a strict reading of the ASVS requirement rather than a practical security concern. ### Recommended Remediation If strict ASVS L2 compliance is required, enable server cipher preference with strongest ciphers first: ```apache SSLHonorCipherOrder on SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256 ``` **Note:** Mozilla's current 'Intermediate' configuration (used by millions of sites) also uses `SSLHonorCipherOrder off`. The current configuration represents industry best practice. If you choose to enable server preference, verify mobile client compatibility (ChaCha20 performance). Consider accepting this as a documented exception with business justification: 'Client preference enabled to optimize mobile performance per Mozilla Intermediate profile.' ### Acceptance Criteria - [ ] Server cipher preference enabled OR risk acceptance documented - [ ] Mobile client compatibility verified (if enabling server preference) - [ ] Documentation updated with justification - [ ] Unit tests verify cipher suite configuration ### References - Source reports: L2:12.1.2.md - Related findings: None - ASVS sections: 12.1.2 ### Priority Low --- -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
