I believe these vulnerabilities are fixed by this recent python 2.7 patch:

http://bugs.python.org/issue13636

Can you confirm?

On Saturday, 19 May 2012 15:37:26 UTC-5, mcm wrote:
>
> Yes rocket just implements SSL using the default python ssl module. There 
> is some deprecated SSL  connection type allowed.  Those should be disabled 
> by default.
>
> mic
> Il giorno 19/mag/2012 21:48, "Massimo Di Pierro" <
> [email protected]> ha scritto:
>
>> I will need your help understand this report.
>>
>> If I understand it:
>>
>> > Session resumption No (IDs assigned but not accepted)
>>
>> This is not a vulnerability. Am I right? This is good because sessions 
>> are managed at web2py level.
>>
>> > BEAST attack Vulnerable   INSECURE
>> > Secure Renegotiation Supported, with client-initiated renegotiation 
>> enabled   DoS DANGER
>>
>> These two are ssl issues. Am I right? Rocket does not implement its own 
>> ssl. It simply wraps the socket using the python-ssl module. Perhaps there 
>> is a way to configure this wrapper. It would help to know if the 
>> same vulnerabilities arise with other python web servers which use 
>> python-ssl. If not we could see what settings are different.
>>
>> Massimo
>>
>>
>> On Friday, 18 May 2012 19:08:27 UTC-5, pyhead wrote:
>>>
>>> Analyzing web2py + Rocket (1.2.4) with the SSL Server Test reveals 
>>> vulnerabilities that give it an 'F' rating even when using the strongest 
>>> RSA 4096 bit key.  web2py's mission is to provide high security by default 
>>> so it should be hardened to address these issues.  Hopefully it is as 
>>> simple as changing the default configuration that ships with web2py.  You 
>>> can test your own server here:
>>>
>>> https://www.ssllabs.com/**ssltest/index.html<https://www.ssllabs.com/ssltest/index.html>
>>>
>>> Weaknesses Reported
>>>
>>> Protocols
>>> SSL 2.0   INSECURE   Yes
>>>
>>> Security Vulnerabilities
>>> - Session resumption No (IDs assigned but not accepted)
>>> - BEAST attack Vulnerable   INSECURE
>>>     (more info) https://community.qualys.com/**
>>> blogs/securitylabs/2011/10/17/**mitigating-the-beast-attack-**on-tls<https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-beast-attack-on-tls>
>>> - Secure Renegotiation Supported, with client-initiated renegotiation 
>>> enabled   DoS DANGER
>>>     (more info) https://community.**qualys.com/blogs/securitylabs/**
>>> 2011/10/31/tls-renegotiation-**and-denial-of-service-attacks<https://community.qualys.com/blogs/securitylabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks>
>>>
>>> Cipher Suites (sorted by strength; server has no preference)
>>> SSL_RC4_128_EXPORT40_WITH_MD5 (0x20080)   WEAK   40
>>> SSL_RC2_128_CBC_EXPORT40_WITH_**MD5 (0x40080)   WEAK  40
>>> SSL_DES_64_CBC_WITH_MD5 (0x60040)   WEAK    56
>>> TLS_RSA_WITH_DES_CBC_SHA (0x9)   WEAK  56
>>>
>>>

Reply via email to