LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   OpenSSL and GNUTLS are insecure by default on Slackware64 14.2 (https://www.linuxquestions.org/questions/slackware-14/openssl-and-gnutls-are-insecure-by-default-on-slackware64-14-2-a-4175621812/)

Matt Owen 01-17-2018 11:05 AM

OpenSSL and GNUTLS are insecure by default on Slackware64 14.2
 
Hi,

Both the OpenSSL and GNUTLS packages in Slackware use insecure ciphers by default. While I agree that you are far more likely to have the endpoint compromised than have ciphers broken it's still annoying none the less. If you are using Slackware as a desktop you check both yourself here:

https://www.howsmyssl.com/

or

https://www.ssllabs.com/ssltest/viewMyClient.html

GNUTLS supports 3DES whose entire cipherspace can be mapped and OpenSSL supports RC4 (which is considered broken these days).

SSLv2 and SSLv3 support should be disabled by default on Slackware for it to be secure. For now I can solve this myself by recompiling OpenSSL and GNUTLS but newer users might be expecting the default installation to be secure. This is primarily a desktop problem as servers (apache, nginx) normally have options to configure which ciphers to support.

The disadvange here is that it will break things e.g. servers that need support for older devices that don't support modern ciphers.

Anyway just my two cents.

Matt

Aeterna 01-17-2018 11:46 AM

Quote:

Originally Posted by Matt Owen (Post 5807563)
Hi,

Both the OpenSSL and GNUTLS packages in Slackware use insecure ciphers by default. While I agree that you are far more likely to have the endpoint compromised than have ciphers broken it's still annoying none the less. If you are using Slackware as a desktop you check both yourself here:

https://www.howsmyssl.com/

or

https://www.ssllabs.com/ssltest/viewMyClient.html

GNUTLS supports 3DES whose entire cipherspace can be mapped and OpenSSL supports RC4 (which is considered broken these days).

SSLv2 and SSLv3 support should be disabled by default on Slackware for it to be secure. For now I can solve this myself by recompiling OpenSSL and GNUTLS but newer users might be expecting the default installation to be secure. This is primarily a desktop problem as servers (apache, nginx) normally have options to configure which ciphers to support.

The disadvange here is that it will break things e.g. servers that need support for older devices that don't support modern ciphers.

Anyway just my two cents.

Matt

This is really old story. I think that it should be user responsibility to configure browser properly. All tools are available and user needs to decide if it is worth to set specific protections in the browser config or not.

Anyway, I am using firefox set to be not vulnerable (for long time now). You can do this with other browsers as well I assume.

BratPit 01-17-2018 11:56 AM

Quote:

Originally Posted by Matt Owen (Post 5807563)
Hi,

Both the OpenSSL and GNUTLS packages in Slackware use insecure ciphers by default. While I agree that you are far more likely to have the endpoint compromised than have ciphers broken it's still annoying none the less. If you are using Slackware as a desktop you check both yourself here:

https://www.howsmyssl.com/

or

https://www.ssllabs.com/ssltest/viewMyClient.html

GNUTLS supports 3DES whose entire cipherspace can be mapped and OpenSSL supports RC4 (which is considered broken these days).

SSLv2 and SSLv3 support should be disabled by default on Slackware for it to be secure. For now I can solve this myself by recompiling OpenSSL and GNUTLS but newer users might be expecting the default installation to be secure. This is primarily a desktop problem as servers (apache, nginx) normally have options to configure which ciphers to support.

The disadvange here is that it will break things e.g. servers that need support for older devices that don't support modern ciphers.

Anyway just my two cents.

Matt

Change browser not system and do not use FUD.

ponce 01-17-2018 01:06 PM

Quote:

Originally Posted by Matt Owen (Post 5807563)
If you are using Slackware as a desktop you check both yourself here:

https://www.howsmyssl.com/

or

https://www.ssllabs.com/ssltest/viewMyClient.html

Hi Matt, I just tried: what's wrong with the results (at the link below)?
https://imgur.com/a/aLszr
the supported protocols are in order of preference, first the more secure ones are tried and the less secure after: this way you can also navigate on site that support older protocols.

Aeterna 01-17-2018 01:28 PM

Quote:

Originally Posted by ponce (Post 5807608)
Hi Matt, I just tried: what's wrong with the results (at the link below)?
https://imgur.com/a/aLszr
the supported protocols are in order of preference, first the more secure ones are tried and the less secure after: this way you can also navigate on site that support older protocols.

maybe consider disabling
security.ssl3.rsa_des_ede3_sha
if you don't use it

ponce 01-17-2018 01:59 PM

Quote:

Originally Posted by Aeterna (Post 5807620)
maybe consider disabling
security.ssl3.rsa_des_ede3_sha
if you don't use it

no, I prefer to have it enabled to allow me using also sites that implement that: it's not that in this way I'm "less secure".
for sites that need security (personal data, e-shopping, banking and so on) I'll check if the algorithm is ok (clicking on the lock, then the right arrow near "secure connection" and then on "more information").

Matt Owen 01-17-2018 02:10 PM

Beautiful,

I accept perfectly that the user is responsible for their own security and expecting anybody else to be is stupid.

Yes my browser may suck because it doesn't have the options to change ciphers (I would be of the opinion that isn't the browsers job but anyway). But there are plenty of tools (less configurable than a browser like firefox) you might use that don't have options such as wget (the ciphers option here doesn't improve things) or your email client (not including Thunderbird) or perhaps you fancy listing the cipher you want with curl. Me being somewhat lazy would rather have the configuration centralized so I don't have to check each individual thing.

As for order of preference with ciphers, I am fairly certain an attacker will simply force your browser to use the least secure available during the initial negotiation.

I am aware of the option security.ssl3.rsa_des_ede3_sha but as alway pointed out not all tools are as configurable as Firefox.

You have all clearly been a lot longer than I have and for the most part agree with you.

Regards,
Matt

ponce 01-17-2018 02:28 PM

Quote:

Originally Posted by Matt Owen (Post 5807639)
Yes my browser may suck because it doesn't have the options to change ciphers (I would be of the opinion that isn't the browsers job but anyway). But there are plenty of tools (less configurable than a browser like firefox) you might use that don't have options such as wget (the ciphers option here doesn't improve things) or your email client (not including Thunderbird) or perhaps you fancy listing the cipher you want with curl. Me being somewhat lazy would rather have the configuration centralized so I don't have to check each individual thing.

what you are proposing in the first post is disabling some ciphers, effectively making some services inaccessible, there's no configuration parameter that let you use them after you have disabled like you suggest, you say that yourself
Quote:

The disadvange here is that it will break things e.g. servers that need support for older devices that don't support modern ciphers.
personally I prefer actively checking where I go without any block that forbids me to use stuff: if you know what you're doing that is legit. it's legit also rebuilding openssl and gnutls, but still if you know what you're doing.
imagine a standard user that can't access sites without even knowing why.

Quote:

As for order of preference with ciphers, I am fairly certain an attacker will simply force your browser to use the least secure available during the initial negotiation.
yes, but you can check which one is used, also with simple tools like curl (snippet found online)
Code:

curl --insecure -v https://www.google.com 2>&1 | awk 'BEGIN { cert=0 } /^\* SSL connection/ { cert=1 } /^\*/ { if (cert) print }'

GazL 01-18-2018 04:30 AM

Quote:

Originally Posted by Aeterna (Post 5807620)
maybe consider disabling
security.ssl3.rsa_des_ede3_sha
if you don't use it

Unnecessary.

After the POODLE attacks became a thing mozilla set security.tls.version.min;1 by default, preventing the use of SSL3 or lower. If someone still requires to use SSL3 for something they may need to re-enable it and then perhaps it might be prudent to fine-tune which ciphers it supports, but for those of us who don't have any specific requirements and just want to be secure firefox already does the right thing with regard to TLS/SSL.


All times are GMT -5. The time now is 09:35 PM.