There are 2 issues with OpenSSL/TLSv1.2 in Ubuntu. I'm on 12.04, but I see the same patch in newer Ubuntu versions.
1) TLSv1.2 is removed from SSLv23_method(). It's technically fine policy decision. But I think it should be reverted at least new Ubuntu versions. All the sites mentioned in +1y old bugs work fine now with TLSv1.2 requests. And several high-profile browsers are now using TLSv1.2 protocol by default (IE11, Chrome, Safari), so any remaining problematic sites will feel pain if they don't fix. Eg, see site and browser state here: https://www.ssllabs.com/ssltest/analyze.html?d=mediafire.com My suggestion: remove this limitation at least from 14.04. 2) TLSv1.2 ciphersuite list is cut to first 25. Thanks to 1) this will affect only apps requesting TLSv1.2 explicitly. It allows only AES256 ciphersuites, which is not big problem. But it also disables secure renegotation, which is signaled with extra ciphersuite. IOW: apps that want the "newest and most secure TLS version" get crippled protocol instead connection failure if some middleware box fails. My suggestion: please revert this patch from everywhere. It's dumb idea to force "max-compat" to apps that explicitly want TLSv1.2. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256576 Title: Ubuntu 12.04 LTS: OpenSSL downlevel version is 1.0.0, and does not support TLS 1.2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1256576/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs