Closed Bug 1042380 Opened 11 years ago Closed 10 years ago

T-Mobile's customer website login is broken without SSL3: ssl_error_no_cypher_overlap on https://tmobile.ecustomersupport.com

Categories

(Web Compatibility :: Site Reports, defect)

defect
Not set
normal

Tracking

(firefox33 unaffected, firefox34 verified, firefox35 verified, firefox36 verified)

RESOLVED FIXED
Tracking Status
firefox33 --- unaffected
firefox34 --- verified
firefox35 --- verified
firefox36 --- verified

People

(Reporter: keeler, Unassigned)

References

Details

(Others might have to be signed in/have a t-mobile account to reproduce this.) When I was re-filling my account using Nightly (34), I encountered ssl_error_no_cypher_overlap when connecting to https://tmobile.ecustomersupport.com. Their site has been flaky on Nightly before, so it may just be them doing some user agent sniffing and then making poor decisions, but it might also be due to us retiring some cipher suites recently.
https://www.ssllabs.com/ssltest/analyze.html?d=tmobile.ecustomersupport.com Only supports SSL3 with: TLS_RSA_WITH_RC4_128_MD5 (0x4) 128 TLS_RSA_WITH_RC4_128_SHA (0x5) 128 TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) 128 TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256 TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) 112 SSL setup for that server appears to be horrible. Only SSL3; no TLS at all. I reproduced the error accidentally as I had SSL3 disabled. (it's currently under consideration for default disable: bug 1042811) If you have it off too, that'll do it. Note that according to this test, IE 11 on Win 8.1 cannot connect to the site at all.
[Tracking Requested - why for this release]: T-Mobile's customer website login is broken without SSL3. This is fallout from Mozilla disabling SSL3 to protect against the POODLE attack. https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
Component: Security: PSM → Desktop
Product: Core → Tech Evangelism
Summary: ssl_error_no_cypher_overlap on https://tmobile.ecustomersupport.com → T-Mobile's customer website login is broken without SSL3: ssl_error_no_cypher_overlap on https://tmobile.ecustomersupport.com
Target Milestone: --- → Nov
Blocks: POODLEBITE
I'm not tracking this for 34 as there will be a number of sites impacted and we need to deal with as many as possible. That effort will happen separately from release tracking.
So, I hit the SSL Labs test link out of curiosity, and I got: Protocols TLS 1.2 No TLS 1.1 No TLS 1.0 Yes SSL 3 No SSL 2 No So... I guess that means this is fixed. Also no problems w/ SSL on connecting to the site, apart from the fact that I get a 0 byte page at the moment.
Thanks for checking, nemo. I can now log into my T-Mobile account with Firefox 33, Beta 34, Aurora 35, and Nightly 36.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Reopening. If this was fixed, it isn't anymore.
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
To clarify the problem now: T-Mobile's customer service site is broken with current stable Firefox. The tmobile.ecustomersupport.com domain is still/again SSL3-only. Tested with Firefox 34.0.5 as well as Firefox 31.3.0 ESR.
Fixed again now.
https://www.ssllabs.com/ssltest/analyze.html?d=tmobile.ecustomersupport.com New current setup appears to be TLS 1.0 only with: TLS_RSA_WITH_RC4_128_MD5 (0x4) 128 TLS_RSA_WITH_RC4_128_SHA (0x5) 128 TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) 128 TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256 TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) 112 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x16) 112 TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) 128 TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) 256 Still fairly pathetic, but should work now if they don't regress yet again. It would be nice if someone could get in touch with someone responsible on their end to get them to fix this. RC4 is on it's way to banning too, and of course not supporting anything other than TLS 1.0 from 1999 is fairly sad. Side note: The developer of SSL Labs has told me that they're fixing their scanner in an update next week so that it won't somehow give a passing grade to SSL3-only sites that don't even work. I guess I'll close this again, unless there are any objections.
Status: REOPENED → RESOLVED
Closed: 10 years ago10 years ago
Resolution: --- → FIXED
No longer blocks: 1133940
Product: Tech Evangelism → Web Compatibility
You need to log in before you can comment on or make changes to this bug.