On 21/10/14 16:05, Ryan O'Hara wrote:
> On Tue, Oct 21, 2014 at 04:56:31PM +0200, Thomas Heil wrote:
>> Hi,
>>
>> On 21.10.2014 16:26, John Leach wrote:
>>> Hi,
>>>
>>> I'm trying to disable sslv3 with the "no-sslv3" bind option, but it's
>>> not working.
>>>
>>> The option is accepted and the restart is successful, but sslv3 is still
>>> accepted:
>>>
>>> $ openssl s_client -ssl3 -connect localhost:443
>>>
>>>  New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
>>>  Server public key is 1024 bit
>>>  Secure Renegotiation IS supported
>>>  Compression: NONE
>>>  Expansion: NONE
>>>  SSL-Session:
>>>      Protocol  : SSLv3
>>>      Cipher    : DHE-RSA-AES256-SHA
>>>      Session-ID:
>>> D74EC1760F565669B7CD8D21636D05AABC9E047DAC94133E62240B3824EB8176
>>>      Session-ID-ctx:
>>>      Master-Key:
>>> 11417200F033C2B542B4FA3A7DC3C00214EFE92C7709FD406014D047D75DBA40573447ED5808962211AF323860367DEE
>>>      Key-Arg   : None
>>>      PSK identity: None
>>>      PSK identity hint: None
>>>      SRP username: None
>>>      Start Time: 1413900818
>>>
>>> double checked with nmap.
>>>
>>> Tested with haproxy 1.5.3 and 1.5.4 on Ubuntu 14.10, Fedora 20 and Centos 7.
>>>
>>> Config is as simple as:
>>>
>>>
>>>   frontend myfrontend
>>>     bind 0.0.0.0:443 ssl crt /etc/haproxy/mycert.pem no-sslv3
>>>     default_backend mybackend
>>>     reqadd X-Forwarded-Proto:\ https
>> Ive checked your config on centos 7 with the official version 1.5.2 and
>> it works.
> 
> I also tried 1.5.2 on RHEL7 and it also works.

thanks for the sanity checks.

Looking more closely (on Ubuntu 14.04), I just changed certificates and
SSLv3 is indeed disabled now, as expected.

I was originally testing with this 1024bit sha1 self-signed junk cert,
which seems to force SSLv3 to be enabled despite being explicitly
disable in the config:

Certificate:
    Data:
        Version: 1 (0x0)
        Serial Number: 12227704756894696610 (0xa9b188b0f51004a2)
    Signature Algorithm: sha1WithRSAEncryption
        Issuer: C=GB, ST=Some-State, O=Internet Widgits Pty Ltd
        Validity
            Not Before: Oct 17 16:50:51 2014 GMT
            Not After : Mar  1 16:50:51 2836 GMT
        Subject: C=GB, ST=Some-State, O=Internet Widgits Pty Ltd
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (1024 bit)


Whereas this new cert is a 2048bit sha512 cert, which allows SSLv3 to be
disabled (tls 1.1 is working fine).

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 980730 (0xef6fa)
    Signature Algorithm: sha512WithRSAEncryption
        Issuer: O=Root CA, OU=http://www.cacert.org, CN=CA Cert Signing
Authority/[email protected]
        Validity
            Not Before: May  4 11:23:10 2014 GMT
            Not After : Oct 31 11:23:10 2014 GMT
        Subject: CN=johnleach.co.uk
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:

So looks like the choice of certificate/key can transparently force
SSLv3 to be re-enabled. Can anyone else confirm? junk self-signed cert
attached.

Thanks,

John.
--
http://brightbox.com


Attachment: ssl_cert.pem
Description: application/x509-ca-cert

Reply via email to