Bug 36173 - apache: SSL3 protocol attack (3.2)
apache: SSL3 protocol attack (3.2)
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P5 normal (vote)
: UCS 3.2-3-errata
Assigned To: Janek Walkenhorst
Felix Botner
Depends on:
  Show dependency treegraph
Reported: 2014-10-15 10:58 CEST by Moritz Muehlenhoff
Modified: 2015-03-02 09:34 CET (History)
2 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-10-15 10:58:25 CEST
We should raise the minimum TLS version used by Apache to 1.0

Browsers which don't even support TLS are incompatible with the UMC and every other web application offered in the App Center.

+++ This bug was initially created as a clone of Bug #36172 +++

+++ This bug was initially created as a clone of Bug #36171 +++

+++ This bug was initially created as a clone of Bug #36170 +++


This will requires fixes in openssl, gnutls and nss. Firefox also needs a fix since it uses a local nss copy. (There are additional Firefox issues, so I'll file a separate bug).

Comment 1 Janek Walkenhorst univentionstaff 2014-10-16 18:27:04 CEST
Advisory: 2014-10-16-univention-apache.yaml
Comment 2 Janek Walkenhorst univentionstaff 2014-10-16 18:27:46 CEST
Tests: OK
Comment 3 Felix Botner univentionstaff 2014-10-17 09:48:44 CEST

# SSLv2 no
-> wget --secure-protocol=SSLv2 --no-check-certificate
--2014-10-17 09:42:09--
Abgebrochen (Speicherabzug geschrieben)


# SSLv3 no
-> wget --secure-protocol=SSLv3 --no-check-certificate
--2014-10-17 09:42:11--
Verbindungsaufbau zu verbunden.
OpenSSL: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure
Es ist nicht möglich, eine SSL-Verbindung herzustellen.

# TLS yes
-> wget --secure-protocol=TLSv1 --no-check-certificate
2014-10-17 09:42:14 (29,5 MB/s) - »»index.html.1«« gespeichert [4412/4412]

https with firefox/chrome still works (TLS 1)

Comment 4 Janek Walkenhorst univentionstaff 2014-10-17 10:52:28 CEST
It should be possible to override the deactivation via UCR.
Comment 5 Janek Walkenhorst univentionstaff 2014-10-17 13:32:40 CEST
(In reply to Janek Walkenhorst from comment #4)
> It should be possible to override the deactivation via UCR.

Description[en]=Enables the insecure protocoll SSL 2.0 (Default: no)

Description[en]=Enables the insecure protocoll SSL 3.0 (Default: no)

Advisory: 2014-10-16-univention-apache.yaml
Comment 6 Felix Botner univentionstaff 2014-10-17 14:39:06 CEST
Comment 7 Janek Walkenhorst univentionstaff 2014-10-22 16:05:28 CEST