This bug is tagged squeeze and users can of course manually disable SSLv3 in newer versions of Dovecot. We should also change the default value of ssl_protocols in newer versions to be "!SSLv2 !SSLv3" to protect them by default.
Suggested fix attached. Jelmer
commit b074edee64fadc172c72fed62fbd664c9770a0d0 Author: Jelmer Vernooij <jel...@debian.org> Date: Sun Nov 9 16:33:11 2014 +0000 Disable SSLv3 by default because of CVE-2014-3566. diff --git a/debian/dovecot-core.NEWS b/debian/dovecot-core.NEWS index 62252f3..f4c478c 100644 --- a/debian/dovecot-core.NEWS +++ b/debian/dovecot-core.NEWS @@ -1,3 +1,14 @@ +dovecot (1:2.2.13-6) unstable; urgency=medium + + The SSLv3 protocol is now disabled by default because of CVE-2014-3566. + To go back to the old default value for ssl protocols, set: + + ssl_protocols = !SSLv2 + + in /etc/dovecot/conf.d/10-ssl.conf + + -- Jelmer Vernooij <jel...@debian.org> Sun, 09 Nov 2014 16:35:45 +0000 + dovecot (1:2.1.7-7) unstable; urgency=high If you are upgrading from stable or the earlier 2.1.7 packages in testing, diff --git a/debian/patches/series b/debian/patches/series index 762771b..70adb7d 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -9,3 +9,4 @@ exampledir.patch mboxlocking.patch dovecot_name.patch bye_logout_not_sent.patch +sslv3-disable.patch diff --git a/debian/patches/sslv3-disable.patch b/debian/patches/sslv3-disable.patch new file mode 100644 index 0000000..c754693 --- /dev/null +++ b/debian/patches/sslv3-disable.patch @@ -0,0 +1,31 @@ +Author: Jelmer Vernooij <jel...@debian.org> +Date: Sun 9 Nov 16:26:36 GMT 2014 +Description: Disable SSLv3 by default +Bug-Debian: http://bugs.debian.org/765473 + +diff --git a/doc/example-config/conf.d/10-ssl.conf b/doc/example-config/conf.d/10-ssl.conf +index 7ae6b7a..e77667b 100644 +--- a/doc/example-config/conf.d/10-ssl.conf ++++ b/doc/example-config/conf.d/10-ssl.conf +@@ -46,7 +46,7 @@ ssl_key = </etc/ssl/private/dovecot.pem + #ssl_dh_parameters_length = 1024 + + # SSL protocols to use +-#ssl_protocols = !SSLv2 ++#ssl_protocols = !SSLv2 !SSLv3 + + # SSL ciphers to use + #ssl_cipher_list = ALL:!LOW:!SSLv2:!EXP:!aNULL +diff --git a/src/lib-master/master-service-ssl-settings.c b/src/lib-master/master-service-ssl-settings.c +index e033e07..90beb8d 100644 +--- a/src/lib-master/master-service-ssl-settings.c ++++ b/src/lib-master/master-service-ssl-settings.c +@@ -43,7 +43,7 @@ static const struct master_service_ssl_settings master_service_ssl_default_setti + .ssl_key = "", + .ssl_key_password = "", + .ssl_cipher_list = "ALL:!LOW:!SSLv2:!EXP:!aNULL", +- .ssl_protocols = "!SSLv2", ++ .ssl_protocols = "!SSLv2 !SSLv3", + .ssl_cert_username_field = "commonName", + .ssl_crypto_device = "", + .ssl_verify_client_cert = FALSE,