I should clarify that my tests results for 6b36-1.13.8-0ubuntu1 are
based on a modified java.security file which removed SSLv3 from the
jdk.tls.disabledAlgorithms property. That may be the reason why they
show SSLv3 as a default-enabled algorithm.

Also, I was finally able to test your Wily package (I had to install an
image in VirtualBox.) Unlike the openjdk-6 package from the PPA, it
works as expected in the sense that TLSv1.2 is on by default:

nbryant@wily:~$ java -version
java version "1.7.0_79"
OpenJDK Runtime Environment (IcedTea 2.5.6) (7u79-2.5.6-1ubuntu1~ppa3)
OpenJDK 64-Bit Server VM (build 24.79-b02, mixed mode)
nbryant@wily:~$ java TLSVersions 
java.vendor     java.version    proto   enabledProtocols
Oracle Corporation      1.7.0_79        TLSv1.2 SSLv3,TLSv1,TLSv1.1,TLSv1.2
Oracle Corporation      1.7.0_79        TLSv1.1 SSLv3,TLSv1,TLSv1.1
Oracle Corporation      1.7.0_79        TLSv1   SSLv3,TLSv1
Oracle Corporation      1.7.0_79        TLS     SSLv3,TLSv1,TLSv1.1,TLSv1.2
Oracle Corporation      1.7.0_79        SSL     SSLv3,TLSv1,TLSv1.1,TLSv1.2

This is a little weird though, SSLv3 is on, even though I have this in
java.security:

jdk.tls.disabledAlgorithms=SSLv3, DH keySize < 768

-- 
You received this bug notification because you are a member of OpenJDK,
which is subscribed to openjdk-7 in Ubuntu.
https://bugs.launchpad.net/bugs/1482924

Title:
  Regressions due to USN-2696-1

Status in openjdk-6 package in Ubuntu:
  New
Status in openjdk-7 package in Ubuntu:
  New

Bug description:
  Due to [CBCATT], some server administrators (including the webservices
  gateway for a major airline reservations provider) choose to disable
  CBC ciphersuites unless the protocol level is TLSv1.1 or later;
  [TLS1.1] introduced an explicit CBC IV to guard against such attacks.
  (See [TLS1.1] section 1.1) On such servers, disabling all CBC
  ciphersuites may leave only RC4 as a trusted cipher.

  JDK7 introduced support for TLSv1.2, but chose not to enable it by
  default, due to a policy of not changing such defaults in minor
  revisions. JDK8 enables TLSv1.2 by default.

  On Ubuntu, due to USN-2696-1, starting with the 
openjdk-7-jre-7u79-2.5.6-0ubuntu1.12.04.1 package, RC4 is disabled by default 
but the protocol default remains TLSv1.0. This can leave no remaining trusted 
ciphers, and
  negotiation can fail.

  Workaround: on OpenJDK7, it is possible to either use
  SSLContext.getInstance("TLSv1.2") or re-enable RC4 via
  SSLSocket.setEnabledCipherSuites(), but neither workaround is viable
  if one doesn't have access to 3rd-party source code.

  References:

     [TLS1.1]   Dierks, T. and E. Rescorla, "The Transport Layer Security
                (TLS) Protocol Version 1.1", RFC 4346, April 2006.
                https://www.ietf.org/rfc/rfc4346.txt

     [CBCATT]   Moeller, B., "Security of CBC Ciphersuites in SSL/TLS:
                Problems and Countermeasures",
                http://www.openssl.org/~bodo/tls-cbc.txt.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openjdk-6/+bug/1482924/+subscriptions

_______________________________________________
Mailing list: https://launchpad.net/~openjdk
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~openjdk
More help   : https://help.launchpad.net/ListHelp

Reply via email to