Because of the POODLE security vulnerability, it has been widely
suggested to disable SSL 3.

Unfortunately there are still deployments where SSL 3 is the only
supported version of SSL/TLS. 

Changing the default in NSS to disable SSL 3 will break applications
that rely on the NSS default and which don't offer configuration options
to override the NSS default.

Therefore we plan to keep SSL 3 enabled by default for another few
months, allowing everyone to migrate legacy applications, and/or to
enhance applications to add configuration mechanisms.

We plan to disable SSL 3 by default in all versions that will be
released after April 1st 2015.

We strongly recommend that applications implement configuration
mechanisms, allowing users to override the set of SSL/TLS protocol
versions enabled by the NSS library. In case of future incidents, should
additional protocol versions be considered insecure, it would allow the
NSS team to change the defaults with shorter notice, and it would
benefit applications that relied on the NSS library defaults.

For users of NSS that already use the new NSS shared database file
format (cert9.db/key4.db/pkcs11.txt): An enhancement is currently under
development, that will allow configuration of the ciphers and protocols
used by NSS for SSL/TLS, independently of application code, by editing
the NSS configuration file pkcs11.txt (see mozilla bug 1009429).

On behalf of the NSS development team


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to