Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
On Wed, Dec 31, 2014 at 13:52:54 +0100, Kurt Roeckx wrote: I would like to disable SSLv3 by default in wheezy. Attached is a debdiff. Kurt diff -Nru openssl-1.0.1e/debian/changelog openssl-1.0.1e/debian/changelog --- openssl-1.0.1e/debian/changelog 2014-10-15 19:45:48.0 +0200 +++ openssl-1.0.1e/debian/changelog 2014-12-31 13:46:02.0 +0100 @@ -1,3 +1,15 @@ +openssl (1.0.1e-2+deb7u14) wheezy-security; urgency=medium + + * Disable SSLv3 by default. It can be enabled again by calling +SSL_CTX_clear_options() or SSL_clear_options() with SSL_OP_NO_SSLv3. +It can also be enabled again by setting OPENSSL_ALLOW_SSLv3 in the +environment to anything. +This fixes the POODLE issue (CVE-2014-3566). + * Fix CVE-2014-3569. We're not affected by it since we don't build with +the no-ssl3 option (yet). + + -- Kurt Roeckx k...@roeckx.be Wed, 31 Dec 2014 13:45:07 +0100 + openssl (1.0.1e-2+deb7u13) wheezy-security; urgency=medium * Fixes CVE-2014-3513 I'm ok with this in principle; the OPENSSL_ALLOW_SSLv3 environment variable really ought to be documented though, at least in a NEWS.Debian for libssl1.0.0. Cheers, Julien signature.asc Description: Digital signature
Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
On Sun, Jan 18, 2015 at 11:59:05AM +0100, Moritz Mühlenhoff wrote: On Wed, Dec 31, 2014 at 04:41:29PM +0100, Kurt Roeckx wrote: On Wed, Dec 31, 2014 at 02:00:23PM +, Adam D. Barratt wrote: Control: tags -1 + moreinfo On Wed, 2014-12-31 at 13:52 +0100, Kurt Roeckx wrote: I would like to disable SSLv3 by default in wheezy. Do we know how well other packages in wheezy cope with that? (I'm going to guess not as well as in jessie.) We could make updated binaries available for testing and ask people to run them for a while? One package that might be affected by this change is that python has a test suite that tries all possible combinations of settings and the test suite is probably going to fail because it's going to expect to be able to set up an SSLv3 connection. I will rebuild python in wheezy to check that. A rebuild of python2.7 with a patched openssl went fine. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150219152907.gb32...@inutil.org
Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
On Wed, Dec 31, 2014 at 04:41:29PM +0100, Kurt Roeckx wrote: On Wed, Dec 31, 2014 at 02:00:23PM +, Adam D. Barratt wrote: Control: tags -1 + moreinfo On Wed, 2014-12-31 at 13:52 +0100, Kurt Roeckx wrote: I would like to disable SSLv3 by default in wheezy. Do we know how well other packages in wheezy cope with that? (I'm going to guess not as well as in jessie.) I have no reason to believe there is a difference between jessie and wheezy in how packages cope with SSLv3 being disabled. Please note that this only affects the SSLv23_* methods and that it just sets SSL_OP_NO_SSLv3 by default now. In jessie SSLv3 is just disabled, for wheezy I would change it to disabled by default with a way to turn it back on. What could break is that apache for instance will now disable SSLv3 by default even though the config file doesn't seem to indicate that it's disabled. That could then result in it not working with some clients that do not support TLSv1 or newer. But that is also already the case in jessie. One package that might be affected by this change is that python has a test suite that tries all possible combinations of settings and the test suite is probably going to fail because it's going to expect to be able to set up an SSLv3 connection. I will rebuild python in wheezy to check that. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150118105905.GA8835@pisco.westfalen.local
Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
Package: release.debian.org Severity: normal Tags: wheezy User: release.debian@packages.debian.org Usertags: pu Hi, I would like to disable SSLv3 by default in wheezy. Attached is a debdiff. Kurt diff -Nru openssl-1.0.1e/debian/changelog openssl-1.0.1e/debian/changelog --- openssl-1.0.1e/debian/changelog 2014-10-15 19:45:48.0 +0200 +++ openssl-1.0.1e/debian/changelog 2014-12-31 13:46:02.0 +0100 @@ -1,3 +1,15 @@ +openssl (1.0.1e-2+deb7u14) wheezy-security; urgency=medium + + * Disable SSLv3 by default. It can be enabled again by calling +SSL_CTX_clear_options() or SSL_clear_options() with SSL_OP_NO_SSLv3. +It can also be enabled again by setting OPENSSL_ALLOW_SSLv3 in the +environment to anything. +This fixes the POODLE issue (CVE-2014-3566). + * Fix CVE-2014-3569. We're not affected by it since we don't build with +the no-ssl3 option (yet). + + -- Kurt Roeckx k...@roeckx.be Wed, 31 Dec 2014 13:45:07 +0100 + openssl (1.0.1e-2+deb7u13) wheezy-security; urgency=medium * Fixes CVE-2014-3513 diff -Nru openssl-1.0.1e/debian/patches/disable_sslv3.patch openssl-1.0.1e/debian/patches/disable_sslv3.patch --- openssl-1.0.1e/debian/patches/disable_sslv3.patch 1970-01-01 01:00:00.0 +0100 +++ openssl-1.0.1e/debian/patches/disable_sslv3.patch 2014-12-31 13:41:07.0 +0100 @@ -0,0 +1,14 @@ +diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c +index d09bb7d..bc3cbc7 100644 +--- a/ssl/ssl_lib.c b/ssl/ssl_lib.c +@@ -2060,6 +2060,9 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth) + */ + ret-options |= SSL_OP_LEGACY_SERVER_CONNECT; + ++ if (getenv(OPENSSL_ALLOW_SSLv3) == NULL) ++ ret-options |= SSL_OP_NO_SSLv3; ++ + return(ret); + err: + SSLerr(SSL_F_SSL_CTX_NEW,ERR_R_MALLOC_FAILURE); diff -Nru openssl-1.0.1e/debian/patches/Keep-old-method-in-case-of-an-unsupported-protocol.patch openssl-1.0.1e/debian/patches/Keep-old-method-in-case-of-an-unsupported-protocol.patch --- openssl-1.0.1e/debian/patches/Keep-old-method-in-case-of-an-unsupported-protocol.patch 1970-01-01 01:00:00.0 +0100 +++ openssl-1.0.1e/debian/patches/Keep-old-method-in-case-of-an-unsupported-protocol.patch 2014-12-31 13:44:16.0 +0100 @@ -0,0 +1,44 @@ +From 392fa7a952e97d82eac6958c81ed1e256e6b8ca5 Mon Sep 17 00:00:00 2001 +From: Kurt Roeckx k...@roeckx.be +Date: Tue, 21 Oct 2014 20:45:15 +0200 +Subject: [PATCH] Keep old method in case of an unsupported protocol +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +When we're configured with no-ssl3 and we receive an SSL v3 Client Hello, we set +the method to NULL. We didn't used to do that, and it breaks things. This is a +regression introduced in 62f45cc27d07187b59551e4fad3db4e52ea73f2c. Keep the old +method since the code is not able to deal with a NULL method at this time. + +CVE-2014-3569, PR#3571 + +Reviewed-by: Emilia Käsper emi...@openssl.org +--- + ssl/s23_srvr.c | 6 -- + 1 file changed, 4 insertions(+), 2 deletions(-) + +diff --git a/ssl/s23_srvr.c b/ssl/s23_srvr.c +index 38960ba..858420d 100644 +--- a/ssl/s23_srvr.c b/ssl/s23_srvr.c +@@ -615,12 +615,14 @@ int ssl23_get_client_hello(SSL *s) + if ((type == 2) || (type == 3)) + { + /* we have SSLv3/TLSv1 (type 2: SSL2 style, type 3: SSL3/TLS style) */ +-s-method = ssl23_get_server_method(s-version); +- if (s-method == NULL) ++ const SSL_METHOD *new_method; ++ new_method = ssl23_get_server_method(s-version); ++ if (new_method == NULL) + { + SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_UNSUPPORTED_PROTOCOL); + goto err; + } ++ s-method = new_method; + + if (!ssl_init_wbio_buffer(s,1)) goto err; + +-- +2.1.4 + diff -Nru openssl-1.0.1e/debian/patches/series openssl-1.0.1e/debian/patches/series --- openssl-1.0.1e/debian/patches/series 2014-10-15 19:30:33.0 +0200 +++ openssl-1.0.1e/debian/patches/series 2014-12-31 13:45:00.0 +0100 @@ -72,4 +72,5 @@ Fix-for-SRTP-Memory-Leak.patch Fix-for-session-tickets-memory-leak.patch Fix-no-ssl3-configuration-option.patch - +disable_sslv3.patch +Keep-old-method-in-case-of-an-unsupported-protocol.patch
Processed: Re: Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
Processing control commands: tags -1 + moreinfo Bug #774299 [release.debian.org] wheezy-pu: openssl: disable SSLv3 by default Added tag(s) moreinfo. -- 774299: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774299 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b774299.142003443220301.transcr...@bugs.debian.org
Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
Control: tags -1 + moreinfo On Wed, 2014-12-31 at 13:52 +0100, Kurt Roeckx wrote: I would like to disable SSLv3 by default in wheezy. Do we know how well other packages in wheezy cope with that? (I'm going to guess not as well as in jessie.) Attached is a debdiff. +openssl (1.0.1e-2+deb7u14) wheezy-security; urgency=medium That's at least confusing. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1420034423.7476.41.ca...@adam-barratt.org.uk
Bug#774299: wheezy-pu: openssl: disable SSLv3 by default
On Wed, Dec 31, 2014 at 02:00:23PM +, Adam D. Barratt wrote: Control: tags -1 + moreinfo On Wed, 2014-12-31 at 13:52 +0100, Kurt Roeckx wrote: I would like to disable SSLv3 by default in wheezy. Do we know how well other packages in wheezy cope with that? (I'm going to guess not as well as in jessie.) I have no reason to believe there is a difference between jessie and wheezy in how packages cope with SSLv3 being disabled. Please note that this only affects the SSLv23_* methods and that it just sets SSL_OP_NO_SSLv3 by default now. In jessie SSLv3 is just disabled, for wheezy I would change it to disabled by default with a way to turn it back on. What could break is that apache for instance will now disable SSLv3 by default even though the config file doesn't seem to indicate that it's disabled. That could then result in it not working with some clients that do not support TLSv1 or newer. But that is also already the case in jessie. One package that might be affected by this change is that python has a test suite that tries all possible combinations of settings and the test suite is probably going to fail because it's going to expect to be able to set up an SSLv3 connection. Attached is a debdiff. +openssl (1.0.1e-2+deb7u14) wheezy-security; urgency=medium That's at least confusing. Right, I should probably change that to wheezy instead. Kurt -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20141231154129.ga18...@roeckx.be