Closed Bug 1090765 Opened 10 years ago Closed 10 years ago

Certain DD-WRT firmwares only support SSLv3 and/or TLS intolerant

Categories

(Core :: Security: PSM, defect)

36 Branch
x86
Linux
defect
Not set
major

Tracking

()

RESOLVED WONTFIX

People

(Reporter: f0rhum, Unassigned)

References

Details

User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:32.0) Gecko/20100101 Firefox/32.0 Build ID: 20140924083558 Steps to reproduce: Try to connect to web management gui of routers Actual results: Error in title, + unspecified error when the server is updated to the latest firmware. Expected results: Connect OK like I used to do with FF32, just storing an exception on first connection.
Severity: normal → major
OS: Linux → Windows XP
Hardware: x86_64 → x86
Version: 32 Branch → 36 Branch
###OLD FIRMWARE CASE### "Secure Connection Failed An error occurred during a connection to 62.xx.xx.xx:8800. Cannot communicate securely with peer: no common encryption algorithm(s). (Error code: ssl_error_no_cypher_overlap) The page you are trying to view cannot be shown because the authenticity of the received data could not be verified." openssl s_client -connect 62.xx.xx.xx:8800 -showcerts < /dev/null CONNECTED(00000003) depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify error:num=18:self signed certificate verify return:1 depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify return:1 --- Certificate chain 0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com -----BEGIN CERTIFICATE----- MIICJDCCAc4CCQCvlxpYBqKdzDANBgkqhkiG9w0BAQUFADCBmDELMAkGA1UEBhMC REUxDjAMBgNVBAgTBVNheG9uMRAwDgYDVQQHEwdEcmVzZGVuMRowGAYDVQQKExFO ZXdNZWRpYS1ORVQgR21iSDEPMA0GA1UECxMGREQtV1JUMRowGAYDVQQDExFOZXdN ZWRpYS1ORVQgR21iSDEeMBwGCSqGSIb3DQEJARYPaW5mb0BkZC13cnQuY29tMB4X DTA5MDcyMDIzNTg1NloXDTE5MDcxODIzNTg1NlowgZgxCzAJBgNVBAYTAkRFMQ4w DAYDVQQIEwVTYXhvbjEQMA4GA1UEBxMHRHJlc2RlbjEaMBgGA1UEChMRTmV3TWVk aWEtTkVUIEdtYkgxDzANBgNVBAsTBkRELVdSVDEaMBgGA1UEAxMRTmV3TWVkaWEt TkVUIEdtYkgxHjAcBgkqhkiG9w0BCQEWD2luZm9AZGQtd3J0LmNvbTBcMA0GCSqG SIb3DQEBAQUAA0sAMEgCQQC5S+wsJXpd3JomYK2N9sfX5p4IvFBJ+8KWd/EAEf0m Mxlb/AshJpoP+taZvbRWGTEwDBtH06EEq8XnG8nJggihAgMBAAEwDQYJKoZIhvcN AQEFBQADQQCj7weXosMmgwI60YC8NYSeLyzUrhXbxJ9d04t1fqIDQRn2H9Ru9oid zFDSPnx/HeyxY2PvBBCtmmvY6a6PUQ+H -----END CERTIFICATE----- --- Server certificate subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com --- No client certificate CA names sent --- SSL handshake has read 730 bytes and written 453 bytes --- New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA Server public key is 512 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : SSLv3 Cipher : DES-CBC3-SHA Session-ID: 01000000C42402E2A3EC6CEB4E6AF66DDC295F9C87D796FEBA2696D007398095 Session-ID-ctx: Master-Key: C87498AE9B585278D0FA3C13F7DF90476699A53AFA997B46D53B5BD53993DD3081E6C384BFF5471EA1C03CBDAAFEFCCE Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1414564411 Timeout : 300 (sec) Verify return code: 18 (self signed certificate) --- DONE ###NEW FIRMWARE CASE (2014/10/27)### "The connection was interrupted The connection to 192.168.xx.xx was interrupted while the page was loading. The site could be temporarily unavailable or too busy. Try again in a few moments. If you are unable to load any pages, check your computer's network connection. If your computer or network is protected by a firewall or proxy, make sure that Nightly is permitted to access the Web." openssl s_client -connect 192.168.xx.xx:443 -showcerts < /dev/null CONNECTED(00000003) 140578602329760:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:177: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 0 bytes and written 305 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE --- openssl s_client -connect 192.168.xx.xx:443 -showcerts -no_tls1 < /dev/null CONNECTED(00000003) depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify error:num=18:self signed certificate verify return:1 depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify return:1 --- Certificate chain 0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com -----BEGIN CERTIFICATE----- MIIDrjCCApYCCQCcHsB556nEMzANBgkqhkiG9w0BAQUFADCBmDELMAkGA1UEBhMC REUxDjAMBgNVBAgTBVNheG9uMRAwDgYDVQQHEwdEcmVzZGVuMRowGAYDVQQKExFO ZXdNZWRpYS1ORVQgR21iSDEPMA0GA1UECxMGREQtV1JUMRowGAYDVQQDExFOZXdN ZWRpYS1ORVQgR21iSDEeMBwGCSqGSIb3DQEJARYPaW5mb0BkZC13cnQuY29tMB4X DTE0MTAyNjIzMTcxM1oXDTI0MTAyMzIzMTcxM1owgZgxCzAJBgNVBAYTAkRFMQ4w DAYDVQQIEwVTYXhvbjEQMA4GA1UEBxMHRHJlc2RlbjEaMBgGA1UEChMRTmV3TWVk aWEtTkVUIEdtYkgxDzANBgNVBAsTBkRELVdSVDEaMBgGA1UEAxMRTmV3TWVkaWEt TkVUIEdtYkgxHjAcBgkqhkiG9w0BCQEWD2luZm9AZGQtd3J0LmNvbTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAO4z3MC/LtFVUzCfgLqZXJmeHw1Yo7Tb vkxRkO+IvNXw0/nH881MXb4doGZ436m+sw+LGyfaoLSmytk9sjkXuwkRPQc1+EYP iGKQHgr43pPM9VNg6Ya80HQtGQNQJNndd8J6pyTQKxBq18DI2D2kDm0eAf9Yk+Qc 2SwxSfncOuZ3Mu9zxdLDcNEQFB7SMCV1Qr8nG2x2/86ZrbnsyeLa4+yH8NwzBOZ5 G7HUFd2CEfQXkyCpKtI0ebHySDxZx6yyFmg1ueJTmom7hJXAnzqZFbQUKma+5C21 OUZDD+E8QxQEGPfiR4+apbZvp3Z8Ff5vTQMRyOjvgAtiCerKGFoN4i0CAwEAATAN BgkqhkiG9w0BAQUFAAOCAQEASrDiC7UXN0JTvFOF+s1Wfdm3W9pAjwE5+en+szd5 9DLi3uFyy3InHItBoSermboSoP51GTkw4BMjnnqPLTS0lg491Rr9VdWracNcvn2c s2r3jzf0TMlu8zZe6S+j/J785rprOIZe2HGRnj+ITgAyiQn/coNe68SY+/hU3TiZ ffzq/tCSSD0tvfULu9lCk7PH8/BX9Na7188dc/GI6gpUOvTPh1V6eLePaWfE4fqo 1MGlydizOaGJ+WLOlsl68Zi1jyXkXxmPeiLLWUTHqw9+z4tfnwGmQUwrf2cZJH3X /WkpgJP0nn7KMXk/EQYHLxrul9ohlYyFlEM0R6vzyx0T5Q== -----END CERTIFICATE----- --- Server certificate subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com --- No client certificate CA names sent --- SSL handshake has read 1124 bytes and written 478 bytes --- New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : SSLv3 Cipher : DES-CBC3-SHA Session-ID: 03000000B764E206BFA03773FC339CD53E8D753B680EB6ABBB10B654962E0775 Session-ID-ctx: Master-Key: F18F13BD37FD042D82EACABA8BDDFB2C0643DC960E109A3498A41265672CB86BFF48BC879979FAC5BC67965A27283C76 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1414564929 Timeout : 300 (sec) Verify return code: 18 (self signed certificate) --- DONE
Component: Untriaged → Security
Same behaviour
OS: Windows XP → Linux
Same behaviour in Windows XP sp3
What's the difference with your previous bug 1089179?
Tests are in Aurora36 and clarification (I have 2 types of errors, 1 with old short keys, 1 with new long keys)
f0rhum: Please keep the issue concerning key sizes to Bug 1084606, and avoid filing duplicate bugs for the same issues. For this bug, please check if re-enabling SSL3 (e.g. via https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control ) will allow you to connect to the router - it looks like the new firmware only supports SSL3 for some reason, which is disabled by default on Firefox 34 and above. Thanks.
Flags: needinfo?(f0rhum)
I seem to have hit this error connecting to bugzilla: An error occurred during a connection to bugzilla.mozilla.org. Cannot communicate securely with peer: no common encryption algorithm(s). (Error code: ssl_error_no_cypher_overlap) reloading the page fixed it 34.0a2 (2014-10-07)34.0a2 (2014-10-07) (Need to investigate why it isn't updating...)
Component: Security → Security: PSM
Product: Firefox → Core
(In reply to Cykesiopka from comment #6) > f0rhum: Please keep the issue concerning key sizes to Bug 1084606, and avoid > filing duplicate bugs for the same issues. > > For this bug, please check if re-enabling SSL3 (e.g. via > https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control ) will > allow you to connect to the router - it looks like the new firmware only > supports SSL3 for some reason, which is disabled by default on Firefox 34 > and above. > > Thanks. Cykesiopka, do I have some more info to provide or action to perform? I have a red button on top left of my bugzilla pages "Flags requested of you: need info (1)" redirecting me here where I see "cykesiopka.bmo: needinfo my@dres.s".
Flags: needinfo?(f0rhum)
(In reply to f0rhum from comment #8) > Cykesiopka, do I have some more info to provide or action to perform? I have > a red button on top left of my bugzilla pages "Flags requested of you: need > info (1)" redirecting me here where I see "cykesiopka.bmo: needinfo > my@dres.s". Hi f0rhum, Yes. Please see Comment 6. It would be nice to get some confirmation about whether my hypothesis concerning SSL3 is correct. Thanks!
The connection to xx.xx.xx.xx was interrupted while the page was loading. This is with the latest Nightly e10s and SSL Version Control 0.3 set to ssl3
Does it have an effect to change the "security.tls.version.fallback-limit" value to 0 in about:config?
No, in 36.0a1 (2014-11-17) the error is now "The server presented a certificate with a key size that is too small to establish a secure connection. (Error code: mozilla_pkix_error_inadequate_key_size) " whatver security.tls.version.fallback-limit is 0 or 1.
(In reply to f0rhum from comment #12) > No, in 36.0a1 (2014-11-17) the error is now "The server presented a > certificate with a key size that is too small to establish a secure > connection. (Error code: mozilla_pkix_error_inadequate_key_size) " whatver > security.tls.version.fallback-limit is 0 or 1. Probably because bug 1084606 landed in Nightly.
(In reply to f0rhum from comment #12) > No, in 36.0a1 (2014-11-17) the error is now "The server presented a > certificate with a key size that is too small to establish a secure > connection. (Error code: mozilla_pkix_error_inadequate_key_size) " whatver > security.tls.version.fallback-limit is 0 or 1. Doesn't it still work after bug 1084606 is fixed with min version SSLv3 and security.tls.version.fallback-limit=0? But dd-wrt should really fix their totally broken firmware. Have you filed a bug on their bug tracker?
Flags: needinfo?(f0rhum)
Summary: ssl_error_no_cypher_overlap → ssl_error_no_cypher_overlap on certain DD-WRT firmware
I have this issue with older Cisco APs (1200 series) and APC UPS remote management cards.
(In reply to James N. Rzepka from comment #16) > I have this issue with older Cisco APs (1200 series) and APC UPS remote > management cards. Please file a new bug. Removing a misleading keyword ftom the bug summary.
Summary: ssl_error_no_cypher_overlap on certain DD-WRT firmware → Certain DD-WRT firmwares only support SSLv3 and/or TLS intolerant
Masatoshi Kimura, I let the "Clear needinfo..." checked and post some new info: I hope this brings some light With my updated FF (32 -> 35.0.1), with SSL Version Control 0.4 plugin set to SSL3 and accessing to some of my router I get an unspecified/generic error below (translated below): "La connexion a été interrompue La connexion avec chelle:18042 a été interrompue pendant le chargement de la page. Le site est peut-être temporairement indisponible ou surchargé. Réessayez plus tard ; Si vous n'arrivez à naviguer sur aucun site, vérifiez la connexion au réseau de votre ordinateur ; Si votre ordinateur ou votre réseau est protégé par un pare-feu ou un proxy, assurez-vous que Firefox est autorisé à accéder au Web." "The connection was interrupted The connection to chelle:18042 was interrupted while the page was loading. The site could be temporarily unavailable or too busy. Try again in a few moment. If you are unable to browse any web site, check your computer's network connection. If your computer or network is protected by a firewall or proxy, make sure that Firefox web access is allowed." Here is a openssl s_client output: openssl s_client -ssl3 -connect chelle:18042 -showcerts < /dev/null CONNECTED(00000003) depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify error:num=18:self signed certificate verify return:1 depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify return:1 --- Certificate chain 0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com -----BEGIN CERTIFICATE----- MIICJDCCAc4CCQCyz4B4vt91DzANBgkqhkiG9w0BAQUFADCBmDELMAkGA1UEBhMC REUxDjAMBgNVBAgTBVNheG9uMRAwDgYDVQQHEwdEcmVzZGVuMRowGAYDVQQKExFO ZXdNZWRpYS1ORVQgR21iSDEPMA0GA1UECxMGREQtV1JUMRowGAYDVQQDExFOZXdN ZWRpYS1ORVQgR21iSDEeMBwGCSqGSIb3DQEJARYPaW5mb0BkZC13cnQuY29tMB4X DTEwMDgwNzAyMjY0OVoXDTIwMDgwNDAyMjY0OVowgZgxCzAJBgNVBAYTAkRFMQ4w DAYDVQQIEwVTYXhvbjEQMA4GA1UEBxMHRHJlc2RlbjEaMBgGA1UEChMRTmV3TWVk aWEtTkVUIEdtYkgxDzANBgNVBAsTBkRELVdSVDEaMBgGA1UEAxMRTmV3TWVkaWEt TkVUIEdtYkgxHjAcBgkqhkiG9w0BCQEWD2luZm9AZGQtd3J0LmNvbTBcMA0GCSqG SIb3DQEBAQUAA0sAMEgCQQCYLAu+n9+DLMuXbQfPuZ61GcYwnkSru748GLwEg2V+ siSQ4BfsUnzeCqCTEBAQM9pcl0TlJ+BagRNXBJ84PHsPAgMBAAEwDQYJKoZIhvcN AQEFBQADQQCWMVYeRshRtG97vlOIwzx01eIDiqHCguLpIbFuL1zij7oo0BW/Bi4r wZsXMT/X6c8e0YBWCpdHUN/POihbfpBg -----END CERTIFICATE----- --- Server certificate subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com --- No client certificate CA names sent --- SSL handshake has read 730 bytes and written 286 bytes --- New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA Server public key is 512 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : SSLv3 Cipher : DES-CBC3-SHA Session-ID: 0300000084B1F4ABFE2BC0829D61663A890C516349D62BA6F2A1795932858028 Session-ID-ctx: Master-Key: BB7778F25DB61C64BAF1F1403ED4DE990EB0F0F749E4FE685B910F310734973DCD538E22179AA4AE30B1DE64434541C8 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1422875536 Timeout : 7200 (sec) Verify return code: 18 (self signed certificate) --- DONE Same target, no specifying ssl3: openssl s_client -connect chelle:18042 -showcerts < /dev/null CONNECTED(00000003) 3078301896:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:177: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 0 bytes and written 213 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE Same target, removing any tls as of man s_client "Unfortunately there are still ancient and broken servers in use which cannot handle this technique and will fail to connect. Some servers only work if TLS is turned off.": openssl s_client -no_tls1 -no_tls1_1 -no_tls1_2 -connect chelle:18042 -showcerts < /dev/null CONNECTED(00000003) depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify error:num=18:self signed certificate verify return:1 depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify return:1 --- Certificate chain 0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com -----BEGIN CERTIFICATE----- MIICJDCCAc4CCQCyz4B4vt91DzANBgkqhkiG9w0BAQUFADCBmDELMAkGA1UEBhMC REUxDjAMBgNVBAgTBVNheG9uMRAwDgYDVQQHEwdEcmVzZGVuMRowGAYDVQQKExFO ZXdNZWRpYS1ORVQgR21iSDEPMA0GA1UECxMGREQtV1JUMRowGAYDVQQDExFOZXdN ZWRpYS1ORVQgR21iSDEeMBwGCSqGSIb3DQEJARYPaW5mb0BkZC13cnQuY29tMB4X DTEwMDgwNzAyMjY0OVoXDTIwMDgwNDAyMjY0OVowgZgxCzAJBgNVBAYTAkRFMQ4w DAYDVQQIEwVTYXhvbjEQMA4GA1UEBxMHRHJlc2RlbjEaMBgGA1UEChMRTmV3TWVk aWEtTkVUIEdtYkgxDzANBgNVBAsTBkRELVdSVDEaMBgGA1UEAxMRTmV3TWVkaWEt TkVUIEdtYkgxHjAcBgkqhkiG9w0BCQEWD2luZm9AZGQtd3J0LmNvbTBcMA0GCSqG SIb3DQEBAQUAA0sAMEgCQQCYLAu+n9+DLMuXbQfPuZ61GcYwnkSru748GLwEg2V+ siSQ4BfsUnzeCqCTEBAQM9pcl0TlJ+BagRNXBJ84PHsPAgMBAAEwDQYJKoZIhvcN AQEFBQADQQCWMVYeRshRtG97vlOIwzx01eIDiqHCguLpIbFuL1zij7oo0BW/Bi4r wZsXMT/X6c8e0YBWCpdHUN/POihbfpBg -----END CERTIFICATE----- --- Server certificate subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com --- No client certificate CA names sent --- SSL handshake has read 730 bytes and written 286 bytes --- New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA Server public key is 512 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : SSLv3 Cipher : DES-CBC3-SHA Session-ID: 04000000844B893E8D0B7ADFC12E5974B51F669ED9ECE820D5A4200F24321AF6 Session-ID-ctx: Master-Key: 281CFFFDF2D00B18564870ECA7E88ABA557CC149746A8748B732C4E9C7E5F22CE7F82D7CBEC2468F3C746EFF0D733944 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1422876001 Timeout : 300 (sec) Verify return code: 18 (self signed certificate) --- DONE And a target that works (only with the plugin set to SSLv3): Please note I do not filter any protocol here: openssl s_client -connect chelle:18033 -showcerts < /dev/null CONNECTED(00000003) depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify error:num=18:self signed certificate verify return:1 depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com verify return:1 --- Certificate chain 0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com -----BEGIN CERTIFICATE----- MIICJDCCAc4CCQDMJ3A6EVkNUjANBgkqhkiG9w0BAQUFADCBmDELMAkGA1UEBhMC REUxDjAMBgNVBAgTBVNheG9uMRAwDgYDVQQHEwdEcmVzZGVuMRowGAYDVQQKExFO ZXdNZWRpYS1ORVQgR21iSDEPMA0GA1UECxMGREQtV1JUMRowGAYDVQQDExFOZXdN ZWRpYS1ORVQgR21iSDEeMBwGCSqGSIb3DQEJARYPaW5mb0BkZC13cnQuY29tMB4X DTA5MTAxMDAyNDIyMFoXDTE5MTAwODAyNDIyMFowgZgxCzAJBgNVBAYTAkRFMQ4w DAYDVQQIEwVTYXhvbjEQMA4GA1UEBxMHRHJlc2RlbjEaMBgGA1UEChMRTmV3TWVk aWEtTkVUIEdtYkgxDzANBgNVBAsTBkRELVdSVDEaMBgGA1UEAxMRTmV3TWVkaWEt TkVUIEdtYkgxHjAcBgkqhkiG9w0BCQEWD2luZm9AZGQtd3J0LmNvbTBcMA0GCSqG SIb3DQEBAQUAA0sAMEgCQQDU7T96BDU0FtkbT1GF9t12JdGw51mPYIRU2rVyPjIW x9NhLdsCoHXyIA35rTxNUBuaatFK1/nzaNaahp0vtKlFAgMBAAEwDQYJKoZIhvcN AQEFBQADQQBYuIHYoPkI/bWAUCH/kMmlh8/m/J14HJgvS80SOcotZlPbic0V31SH fdpdu62zq9cZ/TKP7EVzcUWuKO+2rHrf -----END CERTIFICATE----- --- Server certificate subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com --- No client certificate CA names sent --- SSL handshake has read 730 bytes and written 361 bytes --- New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA Server public key is 512 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : SSLv3 Cipher : DES-CBC3-SHA Session-ID: 03000000E9E92DBA972CAA6406C31F97B0E8D183D62D7762026B0EF85A71D040 Session-ID-ctx: Master-Key: 8D902264ECEBB9D24E20C764AC0263D82808E333268A9E6E63C6BBF55A389ED707DD5F78E6DC8B7556F27A2C9757B6AA Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1422876115 Timeout : 300 (sec) Verify return code: 18 (self signed certificate) --- DONE
Flags: needinfo?(f0rhum)
(In reply to f0rhum from comment #18) > Masatoshi Kimura, I let the "Clear needinfo..." checked and post some new > info: > I hope this brings some light > With my updated FF (32 -> 35.0.1), with SSL Version Control 0.4 plugin set > to SSL3 and accessing to some of my router I get an unspecified/generic > error below (translated below): The SSL version control addon will not change "security.tls.version.fallback-limit". You will have to set the pref manually.
Perhaps it is a good idea, in the initial version of disabling non-secure fallback, to allow all IP addresses and/or all local IP address ranges to fallback. Then, after the feature has survived one version, it can be tightened up.
And allow SSLv3 (for this bug) and 512-bit RSA key (for the SuMo article in comment #20)? I'm not sure it's a good idea.
(In reply to Brian Smith (:briansmith, :bsmith, use NEEDINFO?) from comment #21) > Perhaps it is a good idea, in the initial version of disabling non-secure > fallback, to allow all IP addresses and/or all local IP address ranges to > fallback. Then, after the feature has survived one version, it can be > tightened up. I expect that in relevant scenarios, attackers could fake local network resources (for sites which are in fact public) and thus get back fallback behavior.
(In reply to Florian Weimer from comment #23) > I expect that in relevant scenarios, attackers could fake local network > resources (for sites which are in fact public) and thus get back fallback > behavior. To clarify, I mean allow fallback for cases where the reference ID is an IP address, not a DNS name: e.g. allow fallback for https://192.168.0.1/ or https://[::1:2:3:4]/, but not https://example.com/ even if example.com resolves to 192.168.0.1. This would solve the compatibility issue for all the "home router" scenerios, which are unlikely to be fixed any time soon.
Still, users will have to set "security.tls.version.min" and "security.tls.version.fallback-limit" to 0 unless we allow SSLv3 to IP addresses. And the latter will enable the non-secure fallback anyway. Moreover, I plan to remove SSLv3 support completely since Firefox 39 (bug 1106470). I'm not sure it helps them much to allow non-secure fallbacks to IP addresses.
(In reply to Brian Smith (:briansmith, :bsmith, use NEEDINFO?) from comment #24) > To clarify, I mean allow fallback for cases where the reference ID is an IP > address, not a DNS name: e.g. allow fallback for https://192.168.0.1/ or > https://[::1:2:3:4]/, but not https://example.com/ even if example.com > resolves to 192.168.0.1. > > This would solve the compatibility issue for all the "home router" > scenerios, which are unlikely to be fixed any time soon. Not for all of them, only for a subset which does not encourage users to use an injected domain name (like “fritz.box”) or mDNS. I agree that doing this for IP address literals only would not be highly problematic, but it's not clear if that's worth the trouble.
We don't support SSLv3 anymore.
Status: UNCONFIRMED → RESOLVED
Closed: 10 years ago
Resolution: --- → WONTFIX
Could we hope we will see all these problems solved by adding the good old warnings and exceptions management moved the SSL-VERSION-CONTROL plugging, eventually with stronger warnings on install and usage (e.g. red instead of yellow)?
You need to log in before you can comment on or make changes to this bug.