Closed Bug 1083762 Opened 10 years ago Closed 10 years ago

Disable SSL 3 in the default NSS configuration around April 2015

Categories

(NSS :: Libraries, defect)

3.17.2
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1140029

People

(Reporter: KaiE, Unassigned)

References

Details

Attachments

(1 file)

Given the recent POODLE vulnerability, NSS should no longer suggest to use SSL3 by default. I'll attach a patch.
Attached patch Patch v1Splinter Review
Attachment #8506113 - Flags: review?(rrelyea)
Comment on attachment 8506113 [details] [diff] [review] Patch v1 Review of attachment 8506113 [details] [diff] [review]: ----------------------------------------------------------------- ::: lib/ssl/sslsock.c @@ +93,1 @@ > SSL_LIBRARY_VERSION_TLS_1_0 Is there any reason we wouldn't bump this to 1.2 on the max at the same time?
I'd be OK to also change the default max to 1.2 Given that some applications rely solely on the defaults, it would be a good change to improve security. The risk is that non-retrying client applications might break, when they talk to intolerant servers. But I'd say, that's bad luck for them, applications should either retry to support a configuration for changing the max used protocol version. If we could implement bug 1083767 at the same time, we could point users to potentially set an environment variable, if the NSS default change broke their application. Because of the implications, we might want to decide about the new maximum value in a separate bug. Let's discuss in the weekly conference call.
See Also: → 1083900
Comment on attachment 8506113 [details] [diff] [review] Patch v1 Clearing review request. It seems the time hasn't come yet.
Attachment #8506113 - Flags: review?(rrelyea)
Summary: Disable SSL 3 in the default NSS configuration → Disable SSL 3 in the default NSS configuration around April 2015
Target Milestone: 3.17.3 → ---
Duping forward because the patch bitrotted and bug 1140029 has a reviewed patch.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: