On Wed, Nov 19, 2014 at 7:35 AM, Emmanuel Lécharny <[email protected]>
wrote:
> Hi !
>
> actually, I'm responsible for that.
>
> me as well, I was mistaken that initializing SslContext with "TLS" will
use TLSv1.X, but it turns
out this is not the case.
> based on the information I received, and the informations I grab from
> the internet, I thought tht we were safe.
>
> My mistake. The opened JIRA, where it was explicitely said that doing a
> test prove that we are not protected against POODLE (and I tested it
> myself).
>
> Ok, now, what's the plan ?
>
> There is a solution : we have to provide the SslEngine with the list of
> protocol that it should accept, excluding the ones that we don't want to
> support (here, SSLV3). This boils down to doing something like :
>
> sslEngine.setEnabledProtocols(new String[]{ "TLSv1", "TLSv1.1",
> "TLSv1.2" });
>
> Sadly, this is not a part of ApacheDS, but it's a part of MINA. And
> sadly, we can't pass the list of protocols to MINA, because MINA
> currently does not expose this in its API.
>
> But hopefully, I'm a MINA committer, so I can change this !
>
> Bottom line, I'll add an extension point in MINA which will allow us to
> inject the list of supported protocol to teh SslEngine, then I'll change
> the server to provide the list of protocol we want to use, and test it.
> If it's safe, then I'll cut a quick release (ie, 24h notice instead of
> 72h). The good thing is that MINA 2.0.9 has been released 2 weeks ago,
> and all the apache DS component have been released last week, so there
> is no other important changes that needs to be checked.
>
> Wdyt ?
>
>
> Le 18/11/14 23:52, Pierre Smits a écrit :
> > Hi All,
> >
> > We (as a community) thank you for having persisted, conducted tests and
> > shared with us your finding regarding the POODLE threat that is affecting
> > our Apache Directory Server up to current released milestone (2.0.0-M18).
> >
> > We have found that a piece of software that we have taken from another
> open
> > source project and use a core element in our solution is creating this
> > issue. We are now working very hard to get a new milestone release out
> that
> > will ensure that remove this threat.
> >
> > For more information regarding the POODLE threat and our Apache Directory
> > Server, have a look at:
> > https://issues.apache.org/jira/browse/DIRSERVER-2020. Please share your
> > concerns and insights there.
> >
> > On behalf of the community, thank you.
> >
> > Regards,
> >
> >
> > Pierre Smits
> >
> > *ORRTIZ.COM <http://www.orrtiz.com>*
> > Services & Solutions for Cloud-
> > Based Manufacturing, Professional
> > Services and Retail & Trade
> > http://www.orrtiz.com
> >
> > On Fri, Nov 14, 2014 at 11:17 AM, <[email protected]> wrote:
> >
> >> Hi Emmanuel,
> >>
> >> well I asked the question again because I was not sure whether TLS just
> >> set as the protocol for the SSLConnext or the usage of TLS additionally
> is
> >> enforced.
> >>
> >> However, thanks for the clarification. We will switch to a newer
> version.
> >>
> >> Best regards,
> >> Shushant
> >>
> >>
> >> -----Ursprüngliche Nachricht-----
> >> Von: Emmanuel Lécharny [mailto:[email protected]]
> >> Gesendet: Freitag, 14. November 2014 11:04
> >> An: [email protected]
> >> Betreff: Re: AW: [ApacheDS] Disable usage of SSL (SSLv2 and SSL v3)
> >> protocol
> >>
> >> Le 14/11/14 10:55, [email protected] a écrit :
> >>> Hi,
> >>>
> >>> Well we use Java 1.7.0_71.
> >>>
> >>> The Security Advisory states “However, even if a client and server both
> >> support a version of TLS, the security level offered by SSL 3.0 is still
> >> relevant since many clients implement a protocol downgrade dance to work
> >> around serverside interoperability bugs.”
> >>> The recommendation is to disable SSLv3 either on client or serverside
> to
> >> completely avoid an attack. We would like to do that on our serverside.
> >>
> >> It *is* already disabled, as we enfore the use of TLS.
> >>
> >> I already said that two times. Asking a third time will not bring you
> any
> >> more comfort.
> >>
> >> At this point, I would suggest you check the code by yourself, and if
> you
> >> find some place where you think that SSL v3 can still be used, then
> fill a
> >> JIRA, and we will be very pleased to apply a patch in trunk. Also keep
> in
> >> mind that ApacheDS 1.0 is not anymore maintained, so I strongly suggest
> you
> >> either switch to ApacheDS 2.0, or you are totally on your own.
> >>
>
>
>
--
Kiran Ayyagari
http://keydap.com