Thank you very much for fixing swiftly!

Please forgive me for pointing this out though:

I note that rather than stopping the affected cipher suites from re-
using secrets across connections, you chose to declare the suites as
weak and disabled them altogether.

I appreciate that this is an elegant way to close this vulnerability, in
particular in the absence of an upstream patch.

However, this solution introduces the risk that when trying to establish
a connection with some legacy client or server, they can no longer agree
on a shared cipher, and the TLS handshake fails. That is not in the
spirit of a LTS, which is often elected and used precisely because it
makes it easier to to support legacy products reliably.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1895294

Title:
  Fix Raccoon vulnerability (CVE-2020-1968)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1895294/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to