Hi Thomas!

> So I would like to poll for opinions from people on this list concerning
> this situation. Do you think the default options in the OpenSSL egg
> should be "hardened"? Do you think more options should be introduced? Is
> compatibility with the rest of the internet a concern at all? ;-)

We run Spiffy with SSL on our live site at https://www.knodium.com/

Our users are typically in educational environments where the provided
software is not always of the latest version so we'd like to have as
wide support as possible for clients that might visit our site.

Having said that, I'm not sure which clients on which operating systems
are SSL 3.0 only. In this case we're using OpenSSL on the server side
(http-client may differ) and given that we control what we use there,
the thing that matters is the population of web browsers that require
SSL 3.0 in order to work with HTTPS sites.


Have you seen this article by Google about TLS_FALLBACK_SCSV?

http://googleonlinesecurity.blogspot.co.uk/2014/10/this-poodle-bites-exploiting-ssl-30.html


More info:

https://www.openssl.org/~bodo/ssl-poodle.pdf

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00



Again, I'm not sure which clients support that yet, especially amongst
the older ones which do support TLS but are still old and therefore
might not get updates. This approach doesn't work unless both sides
support it.


>From the Google article it sounds like it might be worth us implementing
TLS_FALLBACK-SCSV and waiting to hear the results of the test in which
they disable SSL 3.0.







Regards,
@ndy

-- 
andy...@ashurst.eu.org
http://www.ashurst.eu.org/
0x7EBA75FF


_______________________________________________
Chicken-users mailing list
Chicken-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/chicken-users

Reply via email to