On 09/07/14 02:22, Konstantin Kolinko wrote:
2014-07-08 23:52 GMT+04:00 Rémy Maucherat <r...@apache.org>:
Hi,

Using the newly added OpenSSL syntax processor, a safe default cipher suite
can be expressed as (for both native and JSSE):
"HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5"
This avoids weak ciphers in a neat and portable way, although the "best"
default is still under investigation.

I plan to change the default for AbstractProcessor.ciphers and
AprEndpoint.SSLCipherSuite to that string.

Do you expect to maintain that string and to change the value between
point releases in the future?

(1.) If not, then it may become obsolete and the situation will not be
much different from what we have now.

(2.) If yes, then do we have enough man power to test and support such changes?
An expected situation is that some clients won't be able to connect to
their servers after such changes.

Do we make a decision of changing the setting by ourselves, or we rely
on some authority? E.g. we may follow [1].

In general, I like the idea.
I think it targets those admins who do not care enough to be able to
configure the values by themselves.

Regarding testing any changes to the value,
https://www.ssllabs.com/ssltest/ server test simulates some known
clients and prints what cipher they would choose with those settings.
E.g. (results for some site)
"IE 6 / XP":  "Protocol or cipher suite mismatch"
so those people wouldn't be able to connect.


A good resource:
[1] https://wiki.mozilla.org/Security/Server_Side_TLS

Their current recommendation is
"ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128:AES256:AES:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK"


Actually people in our security team suggest to remove DES-CBC3-SHA and document how to add back it for backwards compatibility if needed.

Cheers

Jean-Frederic


So
1) I am OK with the change.
2) I think there must be an explicit warning in documentation that the
default value may change at any time.
3) I think we should rely on some authority like [1] and follow them.

Instead of hard-coding the value in Java code, maybe put it as a
property into catalina.properties file,  and reference it as
${propertyname} in server.xml?

We have a nice tool to compare catalina.properties between versions at
http://tomcat.apache.org/migration-8.html#Upgrading_8.0.x

Best regards,
Konstantin Kolinko

---------------------------------------------------------------------
To unsubscribe, e-mail: security-unsubscr...@tomcat.apache.org
For additional commands, e-mail: security-h...@tomcat.apache.org




---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to