Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-16 Thread Ian Jackson
Lars Wirzenius writes ("Re: Bug#765512: general: distrust old crypto algos and protocols perdefault"): > Merely defending one's opinions is a recipe for long threads. A good, > productive discussion about Debian development requires understanding > other people's ar

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-16 Thread Thorsten Glaser
On Wed, 15 Oct 2014, Christoph Anton Mitterer wrote: > I see it a bit differently: > RC4 is broken. Full stop. > Therefore new versions clients and servers should per default not > use/enable/accept it. Sorry, but I *have* to nitpick here. RC4 as used by SSL is mostly broken. (A server could res

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Jonathan Dowland
On Thu, Oct 16, 2014 at 05:42:23AM +0200, Christoph Anton Mitterer wrote: > On Wed, 2014-10-15 at 18:31 -0700, Russ Allbery wrote: > > It feels to me like you're spending lots of time telling other people > > they're wrong and telling other people what they should be spending time > > on, and then

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Arto Jantunen
Joey Hess writes: > In general, I think that Debian needs to identify upstreams that are > being proactive about dropping old crypto algos, and those that are not. > Major browsers, openssh upstream, etc are going to be more on top of > this than we are, and make better decisions. Web servers prob

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Lars Wirzenius
On Thu, Oct 16, 2014 at 05:42:23AM +0200, Christoph Anton Mitterer wrote: > On Wed, 2014-10-15 at 18:31 -0700, Russ Allbery wrote: > > It feels to me like you're spending lots of time telling other people > > they're wrong and telling other people what they should be spending time > > on, and then

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Wed, 2014-10-15 at 18:31 -0700, Russ Allbery wrote: > It feels to me like you're spending lots of time telling other people > they're wrong and telling other people what they should be spending time > on, and then arguing with anyone who tells you that how you're going about > this isn't effect

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Ian Jackson
Christoph Anton Mitterer writes ("Re: Bug#765512: general: distrust old crypto algos and protocols perdefault"): > So what's wrong about my approach, apart from the paradigm "security > first"? Firstly, I agree with everything Russ has said. But secondly, I woul

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Russ Allbery
Christoph Anton Mitterer writes: > So what's wrong about my approach, apart from the paradigm "security > first"? It feels to me like you're spending lots of time telling other people they're wrong and telling other people what they should be spending time on, and then arguing with anyone who te

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Wed, 2014-10-15 at 23:44 +, brian m. carlson wrote: > HIGH:MEDIUM:!aNULL is a better default. Still allows quite a number of combinations I probably wouldn't want to entrust my data: RC4 stuff, DSS stuff, even some MD5 combination is in the list. smime.p7s Description: S/MIME cryptograph

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Thu, 2014-10-16 at 10:55 +1100, Brian May wrote: > What about security updates? Should Debian be releasing wheezy > security updates for browsers, web servers, etc, that disable SSLv3 > by default now that SSLv3 is considered insecure? I'd guess that as soon as the respective vendor issues a

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Wed, 2014-10-15 at 13:58 -0700, Russ Allbery wrote: > The approach that you are taking to this discussion is destroying my > desire and willingness to explain to you all of the nuance that you're > ignoring. Well I respect that you have another opinion on security, but I didn't demand you to ex

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Brian May
On 16 October 2014 10:44, brian m. carlson wrote: > Unfortunately, not all upstreams make good decisions. OpenSSL ships > with a set of default ciphers that is completely insecure. There is no > reason that every application using OpenSSL directly or indirectly[0] > should have to disable expor

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread brian m. carlson
On Wed, Oct 15, 2014 at 01:58:34PM -0700, Russ Allbery wrote: > It's unlikely that you're going to be able to make better cost/benefit > decisions about these things than well-informed upstreams for general use > cases. Debian is targeted for general use cases. If we were making a > security-hard

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread brian m. carlson
On Wed, Oct 15, 2014 at 11:47:07PM +0100, Ian Jackson wrote: > Joey Hess writes ("Bug#765512: general: distrust old crypto algos and > protocols perdefault"): > > Instead, it makes sense to adapt workflows that do not trust git hashes, > > which mostly means making

Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Ian Jackson
Joey Hess writes ("Bug#765512: general: distrust old crypto algos and protocols perdefault"): > Instead, it makes sense to adapt workflows that do not trust git hashes, > which mostly means making signed tags and commits, and checking the > signatures. This is something Debi

Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Florian Weimer
* Christoph Anton Mitterer: > Not sure if there is already some concentrated effort, but I think > there should be one, i.e.: Fedora is currently working on this: However, it is an ongoing effort to make applications adhere to the system d

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Russ Allbery
Christoph Anton Mitterer writes: > On Wed, 2014-10-15 at 12:55 -0700, Russ Allbery wrote: >> For another example, upstream for both Heimdal and MIT Kerberos know >> very well what the situation is with the RC4 use in the Kerberos >> protocol and are making well-informed decisions based on compati

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Wed, 2014-10-15 at 21:55 +0200, Jonas Meurer wrote: > While I appreciate your efforts to raise security-relevant topics within > the Debian distribution, I have to admit that exactly the same happens > to quite a few of your "meta-bugreports" as well. There's a lot of > discussion and a few cha

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Jonathan Dowland
On Wed, Oct 15, 2014 at 09:44:43PM +0200, Christoph Anton Mitterer wrote: > Well a bug is at least something, where one has a central log of all > discussions... and where one can really keep track of... Only if people remember to copy it. And that's less likely to happen when you start getting do

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Jonas Meurer
Hey, Am 15.10.2014 um 21:44 schrieb Christoph Anton Mitterer: > On Wed, 2014-10-15 at 20:25 +0100, Jonathan Dowland wrote: >> There are a number of mechanisms for proposing and tracking distro-wide >> changes, such as release goals and DEPs in some cases. But this is not what >> the >> general b

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Russ Allbery
Joey Hess writes: > In general, I think that Debian needs to identify upstreams that are > being proactive about dropping old crypto algos, and those that are not. > Major browsers, openssh upstream, etc are going to be more on top of > this than we are, and make better decisions. Web servers pro

Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Wed, 2014-10-15 at 15:18 -0400, Joey Hess wrote: > I've talked about this with the git developers before, and while they > seemed to have some ideas for how to handle a conversion to a different > hash, they're not keen on doing it until forced by SHA1 being more > broken than it is now. Well,.

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
On Wed, 2014-10-15 at 20:25 +0100, Jonathan Dowland wrote: > There are a number of mechanisms for proposing and tracking distro-wide > changes, such as release goals and DEPs in some cases. But this is not what > the > general bug is for. Please choose something and then kindly close this bug. We

Re: Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Jonathan Dowland
There are a number of mechanisms for proposing and tracking distro-wide changes, such as release goals and DEPs in some cases. But this is not what the general bug is for. Please choose something and then kindly close this bug. -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org wi

Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Joey Hess
Christoph Anton Mitterer wrote: > For git it's e.g. quite clear that it's use of SHA1 *is* security > relevant. I've talked about this with the git developers before, and while they seemed to have some ideas for how to handle a conversion to a different hash, they're not keen on doing it until for

Bug#765512: general: distrust old crypto algos and protocols perdefault

2014-10-15 Thread Christoph Anton Mitterer
Package: general Severity: important Tags: security Hi. Not sure if there is already some concentrated effort, but I think there should be one, i.e.: --- To disable crypto algorithms and protocols per default, which are known to be no longer secure, across Debian. And ideally, to default to s