Package: libresiprocate-1.9
Version: 1.9.7-1
Severity: serious
Tags: security

Thanks to POODLE[1], CVE-2014-3566, many people want to disable SSL v3.0.

The existing reSIProcate library code offers developers a choice between
TLSv1_method() and SSLv23_method()

Using TLSv1_method() disables the SSL v3 support but has other
limitations, e.g. it does not support TLS 1.1 or 1.2.

Despite the name implying SSL v2 or v3, using SSLv23_method() is also
the way to get TLS v1.1 and TLS v1.2.  Normally, somebody who wants to
support all TLS versions and not be exposed to SSL v3 issues needs to both:

    a) choose SSLv23_method()

    b) set the flag SSL_OP_NO_SSLv3 in a call to SSL_CTX_set_options

Currently, reSIProcate does not call SSL_CTX_set_options and does not
provide any API for the application using reSIProcate to call it.

The new upstream release 1.9.8 specifically targets this issue and
provides a static variable BaseSecurity::OpenSSLCTXSetOptions that can
be used to set these flags.  Furthermore, it now includes the
SSL_OP_NO_SSLv3 flag by default to ensure that SSL v3 is not active
unless somebody explicitly overrides the flags.

This change in reSIProcate 1.9.8 is ABI compatible with 1.9.7 (it only
adds new static variables and static methods) so there should be no need
for a transition.

1. https://security-tracker.debian.org/tracker/CVE-2014-3566


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to