The rationale may make sense depending on the priorities, but shouldn't the default configuration target generic applications? Generic applications don't need compatibility with ancient software (only IE6 on XP actually /needs/ SSLv3, don't know about libraries though).

Administrators who need the support can still enable it and make use of SCSV. And don't forget that 'modern browser' applies to IE up to 11, FF up to 34, Chrome up to ? (couldn't find the exact version) of which actually not a single one has SCSV support and they won't get it! Providing compatibility for ancient out-of-life software and supporting a serious vulnerability for widely used (some ESR) software seems a bit dangerous to me.

The default configuration should protect the /wanna-be/ administrators. All others will most likely tune their config no matter what is supplied.

Best,
Richard

On 10/30/2014 2:47 PM, Maxim Dounin wrote:
Hello!

On Wed, Oct 29, 2014 at 09:17:04PM -0700, Piotr Sikora wrote:

# HG changeset patch
# User Piotr Sikora <pi...@cloudflare.com>
# Date 1414642398 25200
#      Wed Oct 29 21:13:18 2014 -0700
# Node ID bf17486e5d30574b870926b76c1d6f421e4def75
# Parent  87ada3ba1392fadaf4d9193b5d345c248be32f77
SSL: don't enable SSLv3 by default.
This was discussed excessively both in the office here and
in Russian mailing list a while ago, and consensus is that we are
not changing the default for now.

Rationale is as follows:

- SSLv3 is still important from compatibility point of view, there
   are various clients which doesn't support (or enable by default)
   anything better;

- Mitigation for POODLE is already good and improving, including
   fallback protection via TLS_FALLBACK_SCSV and anti-POODLE record
   splitting; so, basically, modern browsers are not affected.



Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
nginx-devel mailing list
nginx-devel@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx-devel

Reply via email to