Looking for comments about feasibility of breaking-up Firefox TLS/SSL-handling 
code into easily-removable sections.

I want to fully separate NSS code from code that handles:

1) MD5 signature handling

2) SHA1 signature handling

3) RSA key exchange

4) CBC mode

5) RC4 ciphers

6) SSLv3

7) TLSv1.0, TLSv1.1

8) SEED, IDEA, 3DES, Camellia cyphers

9) Secondary/Fallback handshake

10) Insecure TLS version feedback

and likely others.

The intention is to phase out and eventually remove support for all of the 
above.

Disabling those technologies in browser options is insufficient. FREAK-like 
attacks will exploit holes in the disabling mechanism to reenable them. 
Alternatively, malware, misguided forks, or clueless users will change those 
settings for the worse.

Removing code from the source code is the only secure way. This also helps code 
maintainability, review, and certifiability.

To facilitate easier code removal, the code needs to be properly separated 
first - and that is the goal of this project.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to