Hello.

That's a good question you're asking here. I, too, think that an Apache
update should correct this default parameter. Nevertheless, it's
probably because it's just an Apache parameter, not an Apache fault as
such, that this default config have not been changed; I would say this
is not a priority for the Debian developers. The default Debian config
is designed as a balance between safety and usability, not as a vault
like OpenBSD: it will be safe in MOST situations, but not all of them.
Besides, Debian being a general purpose distro, the developers are
forced to make compromises on the default configuration to allow it to
function relatively well in most cases. That's why it can include config
choices which are not the best ones regarding security, but the best
compromise between security and usability, and between the various use
cases.

Even if it is strongly recommended to disable SSLv3, for certain
installations like the ones above, it is not necessary. Beyond that,
even if the default Debian config is safe, it is relative: for example,
its default OpenSSH server config allows root login and login using
password, wich is not recommended at all if you want a truly secured
system, which is the case of most users with a publicly reachable Apache
server: those ones are supposed to take care of their Apache config, the
default one being designed not only for a publicly available website,
but also for internal sites, such as an intranet or a test server.

Hoping that I'm right on my interpretation of this Apache update lack,

Regards.

Le jeudi 12 mars 2015 à 13:00 +0100, Vincent Lefevre a écrit : 
> Why hasn't there been a security update of apache2 concerning SSLv3,
> making users vulnerable to POODLE when they use a client supporting
> SSLv3?
> 
> According to various articles found via a Google search[*], it is
> strongly advised to disable SSLv3. Does Debian think differently?
> 
> [*] in particular:
> http://serverfault.com/questions/637706/poodle-is-disabling-ssl-v3-on-server-really-a-solution
> 
> The problem is that some admin assumes that Debian's default is safe
> thus doesn't want to change:
> 
>   https://gforge.inria.fr/tracker/?func=detail&atid=110&aid=18743&group_id=1
> 
>     "There was no update in the stable version, so the Debian
>     security team didn't deem this critical enough. If Debian
>     makes a security update this will be taken in account at
>     InriaForge (and other Debian7-based sites) :)"
> 
> -- 
> Vincent Lefèvre <vinc...@vinc17.net> - Web: <https://www.vinc17.net/>
> 100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
> Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)
> 
> 

-- 
David Guyot
Administrateur système, réseau et télécom / Sysadmin
Europe Camions Interactive / Stockway
Moulin Collot
F-88500 Ambacourt
03 29 30 47 85

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to