: SEC webpages inaccessible due to Firefox blocking servers with
weak DH ciphers
17. Jul 2015 21:06 by will.mcderm...@sjsu.edu:
> Load balancers can also be used like this, while maintaining
> redundancy (assuming HA LB config). Terminate SSL/TLS on the LB and
> run plain-text to t
17. Jul 2015 21:06 by will.mcderm...@sjsu.edu:
> Load balancers can also be used like this, while maintaining redundancy
> (assuming HA LB config). Terminate SSL/TLS on the LB and run plain-text to
> the application/appliance. As long as the load balancer is in an acceptable
> part of the netw
d cost you something like $50.
I'm surprised "SSL stupidifiers" aren't on sale for $9 at Aliexpress or DX.
-Mike
From: NANOG on behalf of Alexander Maassen
Sent: Friday, July 17, 2015 4:50 PM
To: nanog@nanog.org
Subject: Re: SEC webpa
...on Fri, Jul 17, 2015 at 01:42:37PM +, Matthew Huff wrote:
> After making the about:config changes, no warning is given to the user about
> the bad ciphers. Even if you click the SSL lock icon, no warning is given.
> Only if you know that the connection being made with
> "TLS_RSA_WITH
Federal government lands on you like a sack of bricks if you don't provide
this information through their (in)secure website. No exceptions.
Sometimes you can't fire the vendor because they're not a vendor, they're a
freaking regulatory agency with the power to crush you like a bug, and a 5
year a
Weak ciphers? Old (insecure) protocol versions? Open security issues? Vendor
will never provide a patch? Trash goes in the trash bin, no exceptions.
On Fri, Jul 17, 2015 at 07:14:17PM +, Michael O Holstein wrote:
> >making 99% of the web secure is better than keeping an old 1% working
>
> A fine idea, unless for $reason your application is among the 1% ..
> nevermind the arrogance of the "I'm sorry Dave" sort of attitude.
First they came
On Fri, Jul 17, 2015 at 10:26:22AM +0200, Alexander Maassen wrote:
> Ok, it is good to think about security, but not giving you any chance to
> make exceptions is simply forcing users to use another browser in order to
> manage those devices, or to keep an old machine around that not gets
> updated
t you something like $50.
I'm surprised "SSL stupidifiers" aren't on sale for $9 at Aliexpress or DX.
-Mike
From: NANOG on behalf of Alexander Maassen
Sent: Friday, July 17, 2015 4:50 PM
To: nanog@nanog.org
Subject: Re: SEC webpa
>Why do you upgrade your management systems asynchronously to your
>applications? You bring this on yourself.
Perhaps, but SaaS "management systems" are out of our control. They TELL us
when they upgrade, they do not ASK. A web browser isn't really an application,
you can't wait to upgrade.
Re
(Sorry Michael for the duplicate, forgot to press reply all :P)
No problem making the web more secure, but in such cases I think it would
have been better if you could set this behaviour per site, same as with
'invalid/self signed certs'. And in some cases, vendors use weak ciphers
because they al
* michael.holst...@csuohio.edu (Michael O Holstein) [Fri 17 Jul 2015, 21:14
CEST]:
making 99% of the web secure is better than keeping an old 1% working
A fine idea, unless for $reason your application is among the 1% ..
nevermind the arrogance of the "I'm sorry Dave" sort of attitude.
Why do
>making 99% of the web secure is better than keeping an old 1% working
A fine idea, unless for $reason your application is among the 1% .. nevermind
the arrogance of the "I'm sorry Dave" sort of attitude.
As an example .. we have a vendor who, in the current release (last 3 months)
still requir
Robert Drake writes:
> On 7/17/2015 4:26 AM, Alexander Maassen wrote:
> > Well, this block also affects people who have old management hardware
> > around using such ciphers that are for example no longer supported. In my
> > case for example the old Dell DRAC's. And it seems there is no way to
>
As of 38.0.5, this no longer is even an option, as they removed sslv3
support, see the reviews at
https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control/
On Fri, July 17, 2015 2:41 pm, Robert Drake wrote:
>
>
> On 7/17/2015 4:26 AM, Alexander Maassen wrote:
>> Well, this block also aff
On 07/17/2015 08:41 AM, Robert Drake wrote:
> I've also got a jetty server (opennms) that broke due to this,
> so I upgraded and fixed the SSL options and it's still broken in some
> way that won't log errors. I have no time to track that down so the
> workaround is to use the unencrypted version
bert Drake
Sent: Friday, July 17, 2015 8:42 AM
To: nanog@nanog.org
Subject: Re: SEC webpages inaccessible due to Firefox blocking servers with
weak DH ciphers
On 7/17/2015 4:26 AM, Alexander Maassen wrote:
> Well, this block also affects people who have old management hardware
> around us
On 7/17/2015 4:26 AM, Alexander Maassen wrote:
Well, this block also affects people who have old management hardware
around using such ciphers that are for example no longer supported. In my
case for example the old Dell DRAC's. And it seems there is no way to
disable this block.
Ok, it is goo
Well, this block also affects people who have old management hardware
around using such ciphers that are for example no longer supported. In my
case for example the old Dell DRAC's. And it seems there is no way to
disable this block.
Ok, it is good to think about security, but not giving you any c
many web sites are gonna have to upgrade ciphers and get rid of flash.
this will take vastly longer than prudence would dictate.
randy
20 matches
Mail list logo