Bug 36173 - apache: SSL3 protocol attack (3.2)
apache: SSL3 protocol attack (3.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P5 normal (vote)
: UCS 3.2-3-errata
Assigned To: Janek Walkenhorst
Felix Botner
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-10-15 10:58 CEST by Moritz Muehlenhoff
Modified: 2015-03-02 09:34 CET (History)
2 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-10-15 10:58:25 CEST
We should raise the minimum TLS version used by Apache to 1.0

Browsers which don't even support TLS are incompatible with the UMC and every other web application offered in the App Center.


+++ This bug was initially created as a clone of Bug #36172 +++

+++ This bug was initially created as a clone of Bug #36171 +++

+++ This bug was initially created as a clone of Bug #36170 +++

CVE-2014-3566

This will requires fixes in openssl, gnutls and nss. Firefox also needs a fix since it uses a local nss copy. (There are additional Firefox issues, so I'll file a separate bug).

http://googleonlinesecurity.blogspot.fr/2014/10/this-poodle-bites-exploiting-ssl-30.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
Comment 1 Janek Walkenhorst univentionstaff 2014-10-16 18:27:04 CEST
Fixed.
Advisory: 2014-10-16-univention-apache.yaml
Comment 2 Janek Walkenhorst univentionstaff 2014-10-16 18:27:46 CEST
Tests: OK
Comment 3 Felix Botner univentionstaff 2014-10-17 09:48:44 CEST
OK

# SSLv2 no
-> wget --secure-protocol=SSLv2 https://10.200.7.150 --no-check-certificate
--2014-10-17 09:42:09--  https://10.200.7.150/
Abgebrochen (Speicherabzug geschrieben)

(???)

# SSLv3 no
-> wget --secure-protocol=SSLv3 https://10.200.7.150 --no-check-certificate
--2014-10-17 09:42:11--  https://10.200.7.150/
Verbindungsaufbau zu 10.200.7.150:443... verbunden.
OpenSSL: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure
Es ist nicht möglich, eine SSL-Verbindung herzustellen.

# TLS yes
-> wget --secure-protocol=TLSv1 https://10.200.7.150 --no-check-certificate
...
2014-10-17 09:42:14 (29,5 MB/s) - »»index.html.1«« gespeichert [4412/4412]

https with firefox/chrome still works (TLS 1)

OK - YAML
Comment 4 Janek Walkenhorst univentionstaff 2014-10-17 10:52:28 CEST
It should be possible to override the deactivation via UCR.
Comment 5 Janek Walkenhorst univentionstaff 2014-10-17 13:32:40 CEST
(In reply to Janek Walkenhorst from comment #4)
> It should be possible to override the deactivation via UCR.

[apache2/ssl/v2]
Description[en]=Enables the insecure protocoll SSL 2.0 (Default: no)
Type=bool

[apache2/ssl/v3]
Description[en]=Enables the insecure protocoll SSL 3.0 (Default: no)
Type=bool

Advisory: 2014-10-16-univention-apache.yaml
Comment 6 Felix Botner univentionstaff 2014-10-17 14:39:06 CEST
OK
Comment 7 Janek Walkenhorst univentionstaff 2014-10-22 16:05:28 CEST
http://errata.univention.de/ucs/3.2/225.html