Thanks a lot David for testing.
It is important that we track this down and make sure it is not introducing a 
regression.

The related haproxy config would be:
"tune.ssl.default-dh-param <number>"
Sets the maximum size of the Diffie-Hellman parameters used to generate the 
ephemeral/temporary Diffie-Hellman key when using DHE key exchange. Default 
<number> value is 1024. Higher values increase CPU load and may not be 
supported by some clients (IE:Java 7).

That exactly is our case, and /etc/haproxy/haproxy.cfg hasn't changed.
In the default config this argument isn't set so it should still be 1024.


I set up an apache2 with (self signed) certs and enabled TLS1.0. That is old, 
but what you reported for your compat needs.
First I tested the apache itself with testssl.sh.
Your output in regard to the DH length seems to be from the PFS section.
I get here:
 DH group offered:            RFC3526/Oakley Group 14 (2048 bits)


Then I was configuring haproxy+ssl (pre-SRU) in front of apache2 and it gave me

Without the setting above haproxy gives me a nice warning of:
[WARNING] 269/070510 (32043) : Setting tune.ssl.default-dh-param to 1024 by 
default, if your workload permits it you should set it to at least 2048. Please 
set a value >= 1024 to make this warning disappear.

In regard to DH length in PFS in testssl both showed me:
 DH group offered:            HAProxy (1024 bits)

That is just as expected for now.
Upgrading to haproxy from proposed.

The PFS section now really did get bumped, in my case to:
 DH group offered:            RFC5114/2048-bit DSA group with 224-bit prime 
order subgroup (2048 bits)

The full diff of old/new haproxy build is
+ TLSv1.3 (good)
+ PFS (critical for the SRU):
  - changes cipher list
  - extened Elliptic curves
  - increased DH size 1024->2048
+ Some noise due to TLSv1.3 (ok)

One diff element also might shows the a potential this increased.
old:
 LOGJAM (CVE-2015-4000), experimental      VULNERABLE (NOT ok): common prime: 
HAProxy (1024 bits),
new:
 LOGJAM (CVE-2015-4000), experimental      common prime with 2048 bits 
detected: RFC5114/2048-bit DSA group with 224-bit prime order subgroup (2048 
bits),
The USN [1] indicated this was solved by disabling "DH EXPORT ciphers", so it 
shouldn't be a real issue. 
But chances are that the newer openssl has a new "minimum DH size" for security 
reasons in regard to CVE-2015-4000.


Checking workaround by setting an explicit max key in the config ...
=> didn't work still size 2048.
So there is a new minimum in place enforced by the new openssl since/due-to the 
rebuild.

Attaching the testssl logs ...

@Ubuntu-security: is the bump of offered DH keys something known/expected with 
rebuilds against the newer OpenSSL for the CVE found or others?
If it is, is this a wanted change considering the breakage of some old clients 
as reported above?

[1]: https://people.canonical.com/~ubuntu-
security/cve/2015/CVE-2015-4000.html

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-4000

** Attachment added: "testssl logs of apache and old/new haproxy"
   
https://bugs.launchpad.net/ubuntu/+source/haproxy/+bug/1841936/+attachment/5291711/+files/testssl-logs.tgz

** Changed in: haproxy (Ubuntu Bionic)
     Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1841936

Title:
  Rebuild haproxy with openssl 1.1.1 will change features (bionic)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/haproxy/+bug/1841936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to