mod_openssl for Apache is the offending package.

On Thursday, March 12, 2015, David Guyot <
david.gu...@europecamions-interactive.com> wrote:

> Hello.
>
> That's a good question you're asking here. I, too, think that an Apache
> update should correct this default parameter. Nevertheless, it's
> probably because it's just an Apache parameter, not an Apache fault as
> such, that this default config have not been changed; I would say this
> is not a priority for the Debian developers. The default Debian config
> is designed as a balance between safety and usability, not as a vault
> like OpenBSD: it will be safe in MOST situations, but not all of them.
> Besides, Debian being a general purpose distro, the developers are
> forced to make compromises on the default configuration to allow it to
> function relatively well in most cases. That's why it can include config
> choices which are not the best ones regarding security, but the best
> compromise between security and usability, and between the various use
> cases.
>
> Even if it is strongly recommended to disable SSLv3, for certain
> installations like the ones above, it is not necessary. Beyond that,
> even if the default Debian config is safe, it is relative: for example,
> its default OpenSSH server config allows root login and login using
> password, wich is not recommended at all if you want a truly secured
> system, which is the case of most users with a publicly reachable Apache
> server: those ones are supposed to take care of their Apache config, the
> default one being designed not only for a publicly available website,
> but also for internal sites, such as an intranet or a test server.
>
> Hoping that I'm right on my interpretation of this Apache update lack,
>
> Regards.
>
> Le jeudi 12 mars 2015 à 13:00 +0100, Vincent Lefevre a écrit :
> > Why hasn't there been a security update of apache2 concerning SSLv3,
> > making users vulnerable to POODLE when they use a client supporting
> > SSLv3?
> >
> > According to various articles found via a Google search[*], it is
> > strongly advised to disable SSLv3. Does Debian think differently?
> >
> > [*] in particular:
> >
> http://serverfault.com/questions/637706/poodle-is-disabling-ssl-v3-on-server-really-a-solution
> >
> > The problem is that some admin assumes that Debian's default is safe
> > thus doesn't want to change:
> >
> >
> https://gforge.inria.fr/tracker/?func=detail&atid=110&aid=18743&group_id=1
> >
> >     "There was no update in the stable version, so the Debian
> >     security team didn't deem this critical enough. If Debian
> >     makes a security update this will be taken in account at
> >     InriaForge (and other Debian7-based sites) :)"
> >
> > --
> > Vincent Lefèvre <vinc...@vinc17.net <javascript:;>> - Web: <
> https://www.vinc17.net/>
> > 100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
> > Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)
> >
> >
>
> --
> David Guyot
> Administrateur système, réseau et télécom / Sysadmin
> Europe Camions Interactive / Stockway
> Moulin Collot
> F-88500 Ambacourt
> 03 29 30 47 85
>

Reply via email to