This change will be landing in Nightly *this week*, so if you have comments, please send them my way.
On Fri, May 29, 2015 at 3:50 PM, Richard Newman <[email protected]> wrote: > tl;dr: we're planning to switch the cipher suites and TLS versions > supported by Sync and other background services in Firefox for Android. > > If you self-host and sync with Firefox for Android, maintain a third-party > Sync client, or are very interested in cipher suites, read on. > > > *History* > > We used to support Android versions back to API 5. This left some > significant gaps in our coverage; combined with the LB support we had at > the time, and some code limitations, we ended up with a less-than-ideal set > of cipher suites and protocols, falling back on failure. > > > *Modern context* > > There are a bunch of recent and not-so-recent attacks that we'd like to > completely avoid by requiring strong cipher suites and protocols. > > We're still limited by older versions of Android, but we can still do > better than we do now. > > Additionally, some devices ship a restricted Java SSL configuration, so we > can actually cause crashes on those devices. I hope that this change will > fix those problems. > > This is also a step towards tightening up server configurations, so the > sooner we get this into deployed clients, the better. > > > *Proposal* > > On modern Android, we plan to support only TLSv1.2 (preferred) and > TLSv1.1. On older Android, we'll support only TLSv1, *eliminating support > for SSLv3*. > > For cipher suites we'll support only the best available at each level: > > Gingerbread: > TLS_DHE_RSA_WITH_AES_256_CBC_SHA > > Honeycomb onwards: > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA > > 4.4W onwards: > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA > TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA > > > As I understand it, these are a subset (with the exception of > Gingerbread's, perhaps) of the cipher suites that we would like to support > in production, so there should be no issues with matching support in recent > desktop versions or on iOS. > > These selections will apply to FHR and other background services, too, so > I'll be vetting those as best I can. > > > *Testing* > > This proposal needs thorough testing as well as feedback, so — like all > plans — it's subject to change. > > If these supported cipher suites or protocols stand out as bad choices to > you, please let me know. > > I hope to land these changes in the next week or two, uplifting to Aurora > and Beta as appropriate, with eventual release in 39 or 40. > > Thanks! > > -Richard >
_______________________________________________ Sync-dev mailing list [email protected] https://mail.mozilla.org/listinfo/sync-dev

