Landed:

https://bugzilla.mozilla.org/show_bug.cgi?id=1061273#c28

shows the final change. Please file a bug and CC me if you see any problems.

Thanks to Bob, Ryan, Richard, and the rest for their help.

On Tue, Jun 2, 2015 at 10:07 AM, Richard Newman <rnew...@mozilla.com> wrote:

> This change will be landing in Nightly *this week*, so if you have
> comments, please send them my way.
>
> On Fri, May 29, 2015 at 3:50 PM, Richard Newman <rnew...@mozilla.com>
> wrote:
>
>> tl;dr: we're planning to switch the cipher suites and TLS versions
>> supported by Sync and other background services in Firefox for Android.
>>
>> If you self-host and sync with Firefox for Android, maintain a
>> third-party Sync client, or are very interested in cipher suites, read on.
>>
>>
>> *History*
>>
>> We used to support Android versions back to API 5. This left some
>> significant gaps in our coverage; combined with the LB support we had at
>> the time, and some code limitations, we ended up with a less-than-ideal set
>> of cipher suites and protocols, falling back on failure.
>>
>>
>> *Modern context*
>>
>> There are a bunch of recent and not-so-recent attacks that we'd like to
>> completely avoid by requiring strong cipher suites and protocols.
>>
>> We're still limited by older versions of Android, but we can still do
>> better than we do now.
>>
>> Additionally, some devices ship a restricted Java SSL configuration, so
>> we can actually cause crashes on those devices. I hope that this change
>> will fix those problems.
>>
>> This is also a step towards tightening up server configurations, so the
>> sooner we get this into deployed clients, the better.
>>
>>
>> *Proposal*
>>
>> On modern Android, we plan to support only TLSv1.2 (preferred) and
>> TLSv1.1. On older Android, we'll support only TLSv1, *eliminating
>> support for SSLv3*.
>>
>> For cipher suites we'll support only the best available at each level:
>>
>> Gingerbread:
>>   TLS_DHE_RSA_WITH_AES_256_CBC_SHA
>>
>> Honeycomb onwards:
>>   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
>>   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
>>
>> 4.4W onwards:
>>   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
>>   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
>>   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
>>   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
>>   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
>>   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
>>
>>
>> As I understand it, these are a subset (with the exception of
>> Gingerbread's, perhaps) of the cipher suites that we would like to support
>> in production, so there should be no issues with matching support in recent
>> desktop versions or on iOS.
>>
>> These selections will apply to FHR and other background services, too, so
>> I'll be vetting those as best I can.
>>
>>
>> *Testing*
>>
>> This proposal needs thorough testing as well as feedback, so — like all
>> plans — it's subject to change.
>>
>> If these supported cipher suites or protocols stand out as bad choices to
>> you, please let me know.
>>
>> I hope to land these changes in the next week or two, uplifting to Aurora
>> and Beta as appropriate, with eventual release in 39 or 40.
>>
>> Thanks!
>>
>> -Richard
>>
>
>
_______________________________________________
Sync-dev mailing list
Sync-dev@mozilla.org
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to