----- Original Message -----
> From: "Brian Smith" <br...@briansmith.org>
> To: "mozilla's crypto code discussion list" 
> <dev-tech-crypto@lists.mozilla.org>
> Cc: mozilla-dev-tech-cry...@lists.mozilla.org
> Sent: Thursday, 10 July, 2014 2:40:55 AM
> Subject: Re: Road to RC4-free web (the case for YouTube without RC4)
> 
> On Tue, Jul 1, 2014 at 7:15 PM, Julien Pierre <julien.pie...@oracle.com>
> wrote:
> 
> > On 7/1/2014 14:05, Brian Smith wrote:
> >
> >> I think, in parallel with that, we can figure out why so many sites are
> >> still using TLS_ECDHE_*_WITH_RC4_* instead of TLS_ECDHE_*_WITH_AES* and
> >> start the technical evangelism efforts to help them. Cheers, Brian
> >>
> > The reason for sites choosing RC4 over AES_CBC might be due to the various
> > vulnerabilities against CBC mode, at least for sites that support TLS 1.0 .
> > I think a more useful form of evangelism would be to get sites to stop
> > accepting SSL 3.0 and TLS 1.0 protocols.
> >
> 
> Servers that cannot, for whatever reason, support the AES-GCM cipher
> suites, should be changed to prefer AES-CBC cipher suites over RC4-based
> cipher suites at least for TLS 1.1 and later.
> 
> Most sites are not going to stop accepting SSL 3.0 and/or TLS 1.0 any time
> soon, because they want to be compatible with Internet Explorer on Windows
> XP and other software that doesn't support TLS 1.1+.
> 
> However, in the IETF, there is an effort, spearheaded by our friends at
> Google, for solving the downgrade problem:
> http://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
> 
> This simple feature, if implemented by the browser and by the server,
> allows the server to recognize that the browser has tried a non-secure
> downgrade to a lower version of TLS. Once the server recognizes that, the
> server can reject the downgraded connection. The net effect is that,
> assuming modern browsers quickly add support for this mechanism, the server
> can be ensure that it only uses CBC cipher suites with modern browsers over
> TLS 1.1 or later and that it never uses RC4-based cipher suites with modern
> browsers (in conjunction with the "prefer AES-CBC cipher suites over RC4
> cipher suites" change I suggest above).
> 
> However, it is likely that crypto libraries that make the two changes above
> will also have support for TLS_ECDHE_*_WITH_AES_*_GCM cipher suites too.
> So, I hope that they also enable TLS_ECDHE_*_WITH_AES_*_GCM at the same
> time they deploy these changes.
> 
> FWIW, I filed bugs [1][2] for adding support for
> draft-ietf-tls-downgrade-scsv-00 to NSS, Gecko, and Firefox.

What basis do you have to assume that server administrators will actually
upgrade their Apache/nginx/lighttpd/OpenSSL/etc. installations?

There are many installation that still haven't fixed their servers after
Heartbleed (0.5%) or the CCS vulnerability (9%)[1]!
Over 1% of servers still support SSL3 only[2]!

 1 - https://www.trustworthyinternet.org/ssl-pulse/
 2 - http://wp.me/p4BPwe-x
-- 
Regards,
Hubert Kario
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to