On Fri, Mar 28, 2014 at 03:11:46PM -0400, Hubert Kario wrote:

> > I am much more concerned about servers than clients, but it is
> > likely that TLS client apps on XP (perhaps Outlook Express, ...)
> > also have similar problems.
> 
> From what I found through googling I see that the issue was actually
> fixed quite a few years ago.

In theory only.  The fix was very thinly applied, and is no longer
available for download.

> I don't think we should put known weak ciphers in future version of
> openssl's DEFAULT set to work with software configuration that is not
> supported by the vendor right now and won't be supported at all in just
> over a year.

You're still playing "my security level is bigger than yours".
There is no benefit in excluding RC4-SHA1 from the default list.
When servers support stronger algorithms, those will be negotiated.
All you get by exclusing RC4-SHA1 is loss of interoperability, which
may be OK for dedicated environments, but is not a good DEFAULT.

> And since current order already puts 3DES before RC4, people that
> need to workaround this issue, already know about it, so even if they
> update to future openssl version, they know the solution. The workaround
> won't change.

Except that the Microsoft servers in question elect RC4 ahead of
3DES even when the client lists 3DES first.  Disabling RC4 is
typically counter-productive.  You feel better about your security,
but mostly you've just reduced interoperability.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to