On 09/07/2014 13:46, jean-frederic clere wrote:
> On 09/07/14 02:22, Konstantin Kolinko wrote:
>> 2014-07-08 23:52 GMT+04:00 Rémy Maucherat <r...@apache.org>:
>>> Hi,
>>>
>>> Using the newly added OpenSSL syntax processor, a safe default cipher
>>> suite
>>> can be expressed as (for both native and JSSE):
>>> "HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5"
>>> This avoids weak ciphers in a neat and portable way, although the "best"
>>> default is still under investigation.
>>>
>>> I plan to change the default for AbstractProcessor.ciphers and
>>> AprEndpoint.SSLCipherSuite to that string.
>>
>> Do you expect to maintain that string and to change the value between
>> point releases in the future?
>>
>> (1.) If not, then it may become obsolete and the situation will not be
>> much different from what we have now.
>>
>> (2.) If yes, then do we have enough man power to test and support such
>> changes?
>> An expected situation is that some clients won't be able to connect to
>> their servers after such changes.
>>
>> Do we make a decision of changing the setting by ourselves, or we rely
>> on some authority? E.g. we may follow [1].
>>
>> In general, I like the idea.
>> I think it targets those admins who do not care enough to be able to
>> configure the values by themselves.
>>
>> Regarding testing any changes to the value,
>> https://www.ssllabs.com/ssltest/ server test simulates some known
>> clients and prints what cipher they would choose with those settings.
>> E.g. (results for some site)
>> "IE 6 / XP":  "Protocol or cipher suite mismatch"
>> so those people wouldn't be able to connect.
>>
>>
>> A good resource:
>> [1] https://wiki.mozilla.org/Security/Server_Side_TLS
>>
>> Their current recommendation is
>> "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128:AES256:AES:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK"
>>
>>
> 
> Actually people in our security team suggest to remove DES-CBC3-SHA and
> document how to add back it for backwards compatibility if needed.

My personal preference would be a selection that gets the best possible
score given the limitation of the ciphers provided by the JRE (with the
export grade stuff enabled) with https://www.ssllabs.com/ssltest/ with
the additional requirement that it includes a working configuration for
all of the reference clients.


On a related topic, it would be extremely useful if the available
ciphers were exposed through the native interface. Anyone with C skills
fancy taking a look?

My main motivation for this is that we can write a unit test that checks
the mapping of OpenSSL ciphers to JSSE ciphers and highlights (by a
failure) when the mapping changes (e.g. one of them adds support for a
new cipher).

Mark

> 
> Cheers
> 
> Jean-Frederic
> 
>>
>> So
>> 1) I am OK with the change.
>> 2) I think there must be an explicit warning in documentation that the
>> default value may change at any time.
>> 3) I think we should rely on some authority like [1] and follow them.
>>
>> Instead of hard-coding the value in Java code, maybe put it as a
>> property into catalina.properties file,  and reference it as
>> ${propertyname} in server.xml?
>>
>> We have a nice tool to compare catalina.properties between versions at
>> http://tomcat.apache.org/migration-8.html#Upgrading_8.0.x
>>
>> Best regards,
>> Konstantin Kolinko
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: security-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: security-h...@tomcat.apache.org
>>
>>
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: dev-h...@tomcat.apache.org
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to