I will need your help understand this report.

If I understand it:

> Session resumption No (IDs assigned but not accepted)

This is not a vulnerability. Am I right? This is good because sessions are 
managed at web2py level.

> BEAST attack Vulnerable   INSECURE
> Secure Renegotiation Supported, with client-initiated renegotiation 
enabled   DoS DANGER

These two are ssl issues. Am I right? Rocket does not implement its own 
ssl. It simply wraps the socket using the python-ssl module. Perhaps there 
is a way to configure this wrapper. It would help to know if the 
same vulnerabilities arise with other python web servers which use 
python-ssl. If not we could see what settings are different.

Massimo


On Friday, 18 May 2012 19:08:27 UTC-5, pyhead wrote:
>
> Analyzing web2py + Rocket (1.2.4) with the SSL Server Test reveals 
> vulnerabilities that give it an 'F' rating even when using the strongest 
> RSA 4096 bit key.  web2py's mission is to provide high security by default 
> so it should be hardened to address these issues.  Hopefully it is as 
> simple as changing the default configuration that ships with web2py.  You 
> can test your own server here:
>
> https://www.ssllabs.com/ssltest/index.html
>
> Weaknesses Reported
>
> Protocols
> SSL 2.0   INSECURE   Yes
>
> Security Vulnerabilities
> - Session resumption No (IDs assigned but not accepted)
> - BEAST attack Vulnerable   INSECURE
>     (more info) 
> https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-beast-attack-on-tls
> - Secure Renegotiation Supported, with client-initiated renegotiation 
> enabled   DoS DANGER
>     (more info) 
> https://community.qualys.com/blogs/securitylabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks
>
> Cipher Suites (sorted by strength; server has no preference)
> SSL_RC4_128_EXPORT40_WITH_MD5 (0x20080)   WEAK   40
> SSL_RC2_128_CBC_EXPORT40_WITH_MD5 (0x40080)   WEAK  40
> SSL_DES_64_CBC_WITH_MD5 (0x60040)   WEAK    56
> TLS_RSA_WITH_DES_CBC_SHA (0x9)   WEAK  56
>
>

Reply via email to