Launchpad has imported 23 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=857051.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2012-09-13T13:18:13+00:00 Tomas wrote:

Juliano Rizzo and Thai Duong, researches that reported BEAST (Browser
Exploit Against SSL/TLS, bug #737506) attack announced they are planning
to disclose another attack against SSL/TLS named CRIME. The issue is
planned to be presented by them on the ekoparty 2012 conference.

http://www.ekoparty.org/2012/juliano-rizzo.php
http://www.ekoparty.org/2012/thai-duong.php
http://www.h-online.com/security/news/item/BEAST-creators-develop-new-SSL-attack-1702136.html
http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/0

------------------------------------------------------------------------
On 2012-09-13T13:38:02+00:00 Tomas wrote:

After the announcement of the upcoming presentation of CRIME, researches
started to investigate what the issue used by CRIME may be, resulting in
publication attack taking advantage of information leak resulting from
the use of compression in the SSL/TLS, such as following write-up from
Thomas Pornin:

http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-
from-crime-beasts-successor/

Several additional resources now confirm that the CRIME attack is the
same as the problem identified by Thomas Pornin, and explain the meaning
of CRIME abbreviation as "Compression Ratio Info-leak Made Easy":

http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
http://www.youtube.com/watch?v=gGPhHYyg9r4
http://thread.gmane.org/gmane.network.gnutls.general/2887

In addition to zlib/deflate compression used by SSL/TLS, another attack
vector using SPDY protocol with compression over non-compressed SSL/TLS
connection is mentioned.

Also the following research paper form 2002 was pointed out, which
discusses similar problems in the use of compression in SSL/TLS:

http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/1

------------------------------------------------------------------------
On 2012-09-13T18:17:51+00:00 Vincent wrote:

GNUTLS-SA-2012-4 notes the CRIME attack:

http://www.gnu.org/software/gnutls/security.html

and indicates that GnuTLS does not enable compression by default.  It
also indicates that if compression is enabled, use the CBC ciphers
which, while not mitigating the attack, make it substantially harder to
succeed.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/2

------------------------------------------------------------------------
On 2012-09-14T11:28:31+00:00 Jan wrote:

Other references:
https://lwn.net/Articles/516038/
https://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor/19914#19914

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/3

------------------------------------------------------------------------
On 2012-09-14T12:08:12+00:00 Tomas wrote:

Red Hat Enterprise Linux 5 and 6 currently contain Mozilla Firefox
version 10.0.x ESR.  Those versions:

- do not request the use of zlib compression in the SSL/TLS protocol
- do not support SPDY protocol

Therefore, they are not affected by either of the published attack
vectors.

The support for SPDY protocol was added upstream in Firefox version 11,
and only enabled by default in version 13.  Version 15 disables SPDY
protocol compression.

http://www.mozilla.org/en-US/firefox/11.0/releasenotes/
https://hacks.mozilla.org/2012/02/spdy-brings-responsive-and-scalable-transport-to-firefox-11/
http://www.mozilla.org/en-US/firefox/13.0/releasenotes/

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/4

------------------------------------------------------------------------
On 2012-09-14T12:53:39+00:00 Tomas wrote:

OpenSSL enables zlib compression by default for both clients and servers
starting with version 0.9.8:

http://cvs.openssl.org/chngview?cn=9594

The openssl packages in Red Hat Enterprise Linux 5 (starting with
RHBA-2009:0181 update released in Red Hat Enterprise Linux 5.3) and 6,
and also in Fedora, contain a patch that makes the library check if
OPENSSL_NO_DEFAULT_ZLIB environment variable is set (can have arbitrary
value, even empty string) and disable the default zlib support.

http://pkgs.fedoraproject.org/cgit/openssl.git/tree/openssl-0.9.8j-env-
nozlib.patch?id=1d20b5f2

Setting the OPENSSL_NO_DEFAULT_ZLIB environment variable before starting
a client or a server application using OpenSSL can be used to disable
zlib compression support and hence mitigate this flaw.  For example,
httpd with mod_ssl has compression enabled by default in Red Hat
Enterprise Linux 5 and 6, and hence it is used when client also supports
it.  Adding the following line to the /etc/sysconfig/httpd file:

  export OPENSSL_NO_DEFAULT_ZLIB=1

and restarting the httpd service disables the use of SSL/TLS compression
in mod_ssl and the compression will not be negotiated even when
connecting client supports it.  Note that this environment variable only
affects the use of SSL/TLS protocol compression and does not affect the
use of HTTP protocol compression implemented by the mod_deflate module.

The openssl packages in Red Hat Enterprise Linux 3 and 4 are based on
upstream version 0.9.7a and do not enable SSL/TLS zlib compression.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/5

------------------------------------------------------------------------
On 2012-09-14T14:01:15+00:00 Tomas wrote:

Network Security Services (NSS) library, also used by Mozilla Firefox,
does not enable zlib compression by default.  The use of httpd with
mod_nss on Red Hat Enterprise Linux 5 and 6 is not affected by this
issue.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/6

------------------------------------------------------------------------
On 2012-09-14T20:42:34+00:00 Vincent wrote:

Another interesting writeup:

http://bridge.grumpy-troll.org/2012/09/tls-crime-beast-and-you-
programmer.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/7

------------------------------------------------------------------------
On 2012-09-16T16:54:25+00:00 Tomas wrote:

Following CVE ids were assigned to this issue:

CVE-2012-4929 - for the SSL/TLS zlib/deflate attack variant
CVE-2012-4930 - the the SPDY over SSL/TLS connection without compression, now 
tracked via separate bug 857737

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/8

------------------------------------------------------------------------
On 2012-09-24T06:53:21+00:00 Huzaifa wrote:

Mozilla assigned CVE-2012-3977 to the SPDY flaw in Firefox and
Seamonkey.  The CVE is being tracked via the bug #859827.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/9

------------------------------------------------------------------------
On 2012-09-24T11:09:25+00:00 Markus wrote:

(In reply to comment #5)
...
> Adding the following line to the /etc/sysconfig/httpd file:
> 
>   export OPENSSL_NO_DEFAULT_ZLIB=1

But there are other services but http that use ssl and are vulnerable?
Where to set this environment variable system wide?

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/10

------------------------------------------------------------------------
On 2012-09-24T11:32:48+00:00 Tomas wrote:

There is no definitive place where to set environment variables system
wide. The reason is that various services clean up their environment
variable list when executing other binaries. For example the environment
variables are reset when login process is running the user's shell on
login.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/11

------------------------------------------------------------------------
On 2012-10-03T09:11:42+00:00 Tomas wrote:

Qt will disable compression in QSslSocket by default 4.8.4 and 5.0.0:
http://qt.digia.com/Release-Notes/security-issue-september-2012/
http://thread.gmane.org/gmane.comp.lib.qt.devel/6729

Commits:
http://qt.gitorious.org/qt/qt/commit/3488f1db96dbf70bb0486d3013d86252ebf433e0 
(4.7)
http://qt.gitorious.org/qt/qt/commit/d41dc3e101a694dec98d7bbb582d428d209e5401 
(4.8)
http://qt.gitorious.org/qt/qtbase/commit/5ea896fbc63593f424a7dfbb11387599c0025c74
 (5.0)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/12

------------------------------------------------------------------------
On 2012-10-17T13:19:56+00:00 Jan wrote:

Apache httpd web server mod_ssl module upstream bug:
  https://issues.apache.org/bugzilla/show_bug.cgi?id=53219

Relevant commits to disable TLS-level compression:
http://svn.apache.org/viewvc?view=revision&revision=1345319 (against trunk)
http://svn.apache.org/viewvc?view=revision&revision=1369585 (against 2.4.x 
branch)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/13

------------------------------------------------------------------------
On 2012-10-17T14:21:16+00:00 Tomas wrote:

(In reply to comment #14)
> Apache httpd web server mod_ssl module upstream bug:
>   https://issues.apache.org/bugzilla/show_bug.cgi?id=53219

Note that the SSLCompession configuration option was not added in
response to CRIME, but was requested and implemented earlier.  Also see
comment #5 that describes workaround that can be used for httpd /
mod_ssl in existing Red Hat Enterprise Linux version without further
changes.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/14

------------------------------------------------------------------------
On 2012-12-11T16:58:29+00:00 Tomas wrote:

Created openssl tracking bugs for this issue

Affects: fedora-all [bug 886173]

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/21

------------------------------------------------------------------------
On 2013-03-04T21:15:46+00:00 errata-xmlrpc wrote:

This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:0587 https://rhn.redhat.com/errata/RHSA-2013-0587.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/22

------------------------------------------------------------------------
On 2013-03-11T13:25:42+00:00 Tomas wrote:

(In reply to comment #5)
> The openssl packages in Red Hat Enterprise Linux 5 (starting with
> RHBA-2009:0181 update released in Red Hat Enterprise Linux 5.3) and 6, and
> also in Fedora, contain a patch that makes the library check if
> OPENSSL_NO_DEFAULT_ZLIB environment variable is set (can have arbitrary
> value, even empty string) and disable the default zlib support.

Updated openssl packages from RHSA-2013:0587 (see comment 30 above) do
not longer enable zlib compression support by default.  Therefore,
OPENSSL_NO_DEFAULT_ZLIB environment variable is no longer checked.
Instead, they now check for the OPENSSL_DEFAULT_ZLIB environment
variable, which can be used to enable zlib compression support by
default.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/23

------------------------------------------------------------------------
On 2013-03-12T22:24:17+00:00 Tomas wrote:

Created mingw32-openssl tracking bugs for this issue

Affects: epel-5 [bug 920869]

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/24

------------------------------------------------------------------------
On 2013-03-12T22:24:25+00:00 Tomas wrote:

Created mingw-openssl tracking bugs for this issue

Affects: fedora-all [bug 920868]

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/25

------------------------------------------------------------------------
On 2013-03-13T14:47:29+00:00 errata-xmlrpc wrote:

This issue has been addressed in following products:

  RHEV-H and Agents for RHEL-6

Via RHSA-2013:0636 https://rhn.redhat.com/errata/RHSA-2013-0636.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/26

------------------------------------------------------------------------
On 2013-04-19T16:21:39+00:00 Tomas wrote:

OpenSSL packages in Red Hat Enterprise Linux 5 and 6 were updated to no
longer enable by default (comment 31).

NSS, GnuTLS, and Java/JSSE packages either do support compression, or do
not enable it by default (see comments above).

OpenSSL packages included in JBoss product versions for non-RHEL
platforms (Windows, Solaris) are not built with zlib support and hence
were not affected by this problem.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/27

------------------------------------------------------------------------
On 2014-04-17T12:27:01+00:00 errata-xmlrpc wrote:

This issue has been addressed in following products:

  RHEV Manager version 3.3

Via RHSA-2014:0416 https://rhn.redhat.com/errata/RHSA-2014-0416.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1068854/comments/28


** Changed in: apache2 (Fedora)
       Status: Unknown => Fix Released

** Changed in: apache2 (Fedora)
   Importance: Unknown => Medium

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4930

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-3977

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1068854

Title:
  Support option to disable TLS compression to protect against CRIME
  attack

To manage notifications about this bug go to:
https://bugs.launchpad.net/apache2/+bug/1068854/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to