Yes rocket just implements SSL using the default python ssl module. There is some deprecated SSL connection type allowed. Those should be disabled by default.
mic Il giorno 19/mag/2012 21:48, "Massimo Di Pierro" <[email protected]> ha scritto: > I will need your help understand this report. > > If I understand it: > > > Session resumption No (IDs assigned but not accepted) > > This is not a vulnerability. Am I right? This is good because sessions are > managed at web2py level. > > > BEAST attack Vulnerable INSECURE > > Secure Renegotiation Supported, with client-initiated renegotiation > enabled DoS DANGER > > These two are ssl issues. Am I right? Rocket does not implement its own > ssl. It simply wraps the socket using the python-ssl module. Perhaps there > is a way to configure this wrapper. It would help to know if the > same vulnerabilities arise with other python web servers which use > python-ssl. If not we could see what settings are different. > > Massimo > > > On Friday, 18 May 2012 19:08:27 UTC-5, pyhead wrote: >> >> Analyzing web2py + Rocket (1.2.4) with the SSL Server Test reveals >> vulnerabilities that give it an 'F' rating even when using the strongest >> RSA 4096 bit key. web2py's mission is to provide high security by default >> so it should be hardened to address these issues. Hopefully it is as >> simple as changing the default configuration that ships with web2py. You >> can test your own server here: >> >> https://www.ssllabs.com/**ssltest/index.html<https://www.ssllabs.com/ssltest/index.html> >> >> Weaknesses Reported >> >> Protocols >> SSL 2.0 INSECURE Yes >> >> Security Vulnerabilities >> - Session resumption No (IDs assigned but not accepted) >> - BEAST attack Vulnerable INSECURE >> (more info) https://community.qualys.com/** >> blogs/securitylabs/2011/10/17/**mitigating-the-beast-attack-**on-tls<https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-beast-attack-on-tls> >> - Secure Renegotiation Supported, with client-initiated renegotiation >> enabled DoS DANGER >> (more info) https://community.**qualys.com/blogs/securitylabs/** >> 2011/10/31/tls-renegotiation-**and-denial-of-service-attacks<https://community.qualys.com/blogs/securitylabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks> >> >> Cipher Suites (sorted by strength; server has no preference) >> SSL_RC4_128_EXPORT40_WITH_MD5 (0x20080) WEAK 40 >> SSL_RC2_128_CBC_EXPORT40_WITH_**MD5 (0x40080) WEAK 40 >> SSL_DES_64_CBC_WITH_MD5 (0x60040) WEAK 56 >> TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56 >> >>

