On Tue, 2015-04-28 at 06:10 -0400, Jan Kurik wrote:
> = Proposed System Wide Change: Disable SSL3 and RC4 by default =
> https://fedoraproject.org/wiki/Changes/RemoveSSL3andRc4
> 
> Change owner(s): Nikos Mavrogiannopoulos <n...@redhat.com>
> 
> This change will disable by default the SSL 3.0 protocol and the RC4 cipher 
> in components which use the system wide crypto policy. That is, gnutls and 
> openssl libraries, and all the applications based on them. 
> 
> == Detailed Description ==
> There are serious vulnerabilities known to the SSL 3.0 protocol, since a 
> decade. Recent attacks (e.g., the POODLE issue #1152789) take advantage of 
> them, negating the secrecy offerings of the protocol. The RC4 cipher is also 
> considered cryptographically broken, and new attacks against its secrecy are 
> made known every year (#1207101). Since attacks are only getting better, we 
> should disable these broken protocols and ciphers system wide. 
> 
> == Scope ==
> * Proposal owners: The crypto-policies package has to be updated to 
> accommodate the new policies.
> * Other developers: Should verify that their package works after the change. 
> That is that their package doesn't require only SSL 3.0, or only the RC4 
> ciphersuites. If their package requires these options due to design, they 
> should consider contacting upstream to update the software. If that is not 
> possible, or this support is needed to contact legacy servers, they should 
> consider not using the system wide policy, and make that apparent in the 
> package documentation. 
> * Release engineering: This feature doesn't require coordination with release 
> engineering. 
> * Policies and guidelines: The packaging guidelines do not need to be 
> changed. 
For clarification: This is only changing the default - SSL 3.0 is still
available if specifically enabled? If so, we need to include
documentation on enabling it.

Bigger question - should we deprecate SSL 3.0 and plan to remove it in
F25? (F25 gives people a year to prepare after being notified of
deprecation in F23.)

We are looking at deprecating and ultimately removing a larger set of
ciphers:

/* 56-bit DES "domestic" cipher suites */ 
TLS_DHE_RSA_WITH_DES_CBC_SHA,
TLS_DHE_DSS_WITH_DES_CBC_SHA,
SSL_RSA_FIPS_WITH_DES_CBC_SHA,
TLS_RSA_WITH_DES_CBC_SHA,
TLS_DH_anon_WITH_DES_CBC_SHA,
TLS_KRB5_WITH_DES_CBC_SHA,
TLS_KRB5_WITH_DES_CBC_MD5

 /* export ciphersuites with 1024-bit public key exchange keys */ 
 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,
 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA,
 /* export ciphersuites with 512-bit public key exchange keys */ 
TLS_RSA_EXPORT_WITH_RC4_40_MD5,
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA,
TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA,
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA,
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA,
TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA,
TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5,
TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5,
TLS_DH_anon_EXPORT_WITH_RC4_40_MD5,
TLS_KRB5_EXPORT_WITH_RC4_40_SHA,
TLS_KRB5_EXPORT_WITH_RC4_40_MD5,

Should these ciphers be included in this proposal?
> 
> -- 
> Jan Kuřík
> _______________________________________________
> devel-announce mailing list
> devel-annou...@lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/devel-announce


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to