Hi,

On 30.10.2014 19:13, Emeric Brun wrote:
> On 10/21/2014 05:43 PM, John Leach wrote:
>> On 21/10/14 16:05, Ryan O'Hara wrote:
>>> On Tue, Oct 21, 2014 at 04:56:31PM +0200, Thomas Heil wrote:
>>>> Hi,
>>>>
>>>> On 21.10.2014 16:26, John Leach wrote:
>>>>> Hi,
>>>>>
>>>>> I'm trying to disable sslv3 with the "no-sslv3" bind option, but it's
>>>>> not working.
>>>>>
>>>>> The option is accepted and the restart is successful, but sslv3 is
>>>>> still
>>>>> accepted:
>>>>>
>>>>> $ openssl s_client -ssl3 -connect localhost:443
>>>>>
>>>>>   New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
>>>>>   Server public key is 1024 bit
>>>>>   Secure Renegotiation IS supported
>>>>>   Compression: NONE
>>>>>   Expansion: NONE
>>>>>   SSL-Session:
>>>>>       Protocol  : SSLv3
>>>>>       Cipher    : DHE-RSA-AES256-SHA
>>>>>       Session-ID:
>>>>> D74EC1760F565669B7CD8D21636D05AABC9E047DAC94133E62240B3824EB8176
>>>>>       Session-ID-ctx:
>>>>>       Master-Key:
>>>>> 11417200F033C2B542B4FA3A7DC3C00214EFE92C7709FD406014D047D75DBA40573447ED5808962211AF323860367DEE
>>>>>
>>>>>       Key-Arg   : None
>>>>>       PSK identity: None
>>>>>       PSK identity hint: None
>>>>>       SRP username: None
>>>>>       Start Time: 1413900818
>>>>>
>>>>> double checked with nmap.
>>>>>
>>>>> Tested with haproxy 1.5.3 and 1.5.4 on Ubuntu 14.10, Fedora 20 and
>>>>> Centos 7.
>>>>>
>>>>> Config is as simple as:
>>>>>
>>>>>
>>>>>    frontend myfrontend
>>>>>      bind 0.0.0.0:443 ssl crt /etc/haproxy/mycert.pem no-sslv3
>>>>>      default_backend mybackend
>>>>>      reqadd X-Forwarded-Proto:\ https
>>>> Ive checked your config on centos 7 with the official version 1.5.2
>>>> and
>>>> it works.
>>>
>>> I also tried 1.5.2 on RHEL7 and it also works.
>>
>> thanks for the sanity checks.
>>
>> Looking more closely (on Ubuntu 14.04), I just changed certificates and
>> SSLv3 is indeed disabled now, as expected.
>>
>> I was originally testing with this 1024bit sha1 self-signed junk cert,
>> which seems to force SSLv3 to be enabled despite being explicitly
>> disable in the config:
>>
>> Certificate:
>>      Data:
>>          Version: 1 (0x0)
>>          Serial Number: 12227704756894696610 (0xa9b188b0f51004a2)
>>      Signature Algorithm: sha1WithRSAEncryption
>>          Issuer: C=GB, ST=Some-State, O=Internet Widgits Pty Ltd
>>          Validity
>>              Not Before: Oct 17 16:50:51 2014 GMT
>>              Not After : Mar  1 16:50:51 2836 GMT
>>          Subject: C=GB, ST=Some-State, O=Internet Widgits Pty Ltd
>>          Subject Public Key Info:
>>              Public Key Algorithm: rsaEncryption
>>                  Public-Key: (1024 bit)
>>
>>
>> Whereas this new cert is a 2048bit sha512 cert, which allows SSLv3 to be
>> disabled (tls 1.1 is working fine).
>>
>> Certificate:
>>      Data:
>>          Version: 3 (0x2)
>>          Serial Number: 980730 (0xef6fa)
>>      Signature Algorithm: sha512WithRSAEncryption
>>          Issuer: O=Root CA, OU=http://www.cacert.org, CN=CA Cert Signing
>> Authority/[email protected]
>>          Validity
>>              Not Before: May  4 11:23:10 2014 GMT
>>              Not After : Oct 31 11:23:10 2014 GMT
>>          Subject: CN=johnleach.co.uk
>>          Subject Public Key Info:
>>              Public Key Algorithm: rsaEncryption
>>                  Public-Key: (2048 bit)
>>                  Modulus:
>>
>> So looks like the choice of certificate/key can transparently force
>> SSLv3 to be re-enabled. Can anyone else confirm? junk self-signed cert
>> attached.
>>
>> Thanks,
>>
>> John.
>> -- 
>> http://brightbox.com
>>
>>
>
>
> Hi,
>
> This bug appears when the certificate does not present any CommonName
> in subject nor DNS aliases (i doubt about the validity of this kind of
> certificate).
>
> We will fix it soon, but it is not critical.
>
thanks for clarification.
> Emeric
>
>
>
>

cheers
thomas

Reply via email to