Closed
Bug 1090765
Opened 10 years ago
Closed 10 years ago
Certain DD-WRT firmwares only support SSLv3 and/or TLS intolerant
Categories
(Core :: Security: PSM, defect)
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: f0rhum, Unassigned)
References
Details
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:32.0) Gecko/20100101 Firefox/32.0
Build ID: 20140924083558
Steps to reproduce:
Try to connect to web management gui of routers
Actual results:
Error in title, + unspecified error when the server is updated to the latest firmware.
Expected results:
Connect OK like I used to do with FF32, just storing an exception on first connection.
Severity: normal → major
OS: Linux → Windows XP
Hardware: x86_64 → x86
Version: 32 Branch → 36 Branch
###OLD FIRMWARE CASE###
"Secure Connection Failed
An error occurred during a connection to 62.xx.xx.xx:8800. Cannot communicate securely with peer: no common encryption algorithm(s). (Error code: ssl_error_no_cypher_overlap)
The page you are trying to view cannot be shown because the authenticity of the received data could not be verified."
openssl s_client -connect 62.xx.xx.xx:8800 -showcerts < /dev/null
CONNECTED(00000003)
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify return:1
---
Certificate chain
0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
---
No client certificate CA names sent
---
SSL handshake has read 730 bytes and written 453 bytes
---
New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
Server public key is 512 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : DES-CBC3-SHA
Session-ID: 01000000C42402E2A3EC6CEB4E6AF66DDC295F9C87D796FEBA2696D007398095
Session-ID-ctx:
Master-Key: C87498AE9B585278D0FA3C13F7DF90476699A53AFA997B46D53B5BD53993DD3081E6C384BFF5471EA1C03CBDAAFEFCCE
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1414564411
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
---
DONE
###NEW FIRMWARE CASE (2014/10/27)###
"The connection was interrupted
The connection to 192.168.xx.xx was interrupted while the page was loading.
The site could be temporarily unavailable or too busy. Try again in a few moments.
If you are unable to load any pages, check your computer's network connection.
If your computer or network is protected by a firewall or proxy, make sure that Nightly is permitted to access the Web."
openssl s_client -connect 192.168.xx.xx:443 -showcerts < /dev/null
CONNECTED(00000003)
140578602329760:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:177:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 305 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
---
openssl s_client -connect 192.168.xx.xx:443 -showcerts -no_tls1 < /dev/null
CONNECTED(00000003)
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify return:1
---
Certificate chain
0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
-----BEGIN CERTIFICATE-----
MIIDrjCCApYCCQCcHsB556nEMzANBgkqhkiG9w0BAQUFADCBmDELMAkGA1UEBhMC
REUxDjAMBgNVBAgTBVNheG9uMRAwDgYDVQQHEwdEcmVzZGVuMRowGAYDVQQKExFO
ZXdNZWRpYS1ORVQgR21iSDEPMA0GA1UECxMGREQtV1JUMRowGAYDVQQDExFOZXdN
ZWRpYS1ORVQgR21iSDEeMBwGCSqGSIb3DQEJARYPaW5mb0BkZC13cnQuY29tMB4X
DTE0MTAyNjIzMTcxM1oXDTI0MTAyMzIzMTcxM1owgZgxCzAJBgNVBAYTAkRFMQ4w
DAYDVQQIEwVTYXhvbjEQMA4GA1UEBxMHRHJlc2RlbjEaMBgGA1UEChMRTmV3TWVk
aWEtTkVUIEdtYkgxDzANBgNVBAsTBkRELVdSVDEaMBgGA1UEAxMRTmV3TWVkaWEt
TkVUIEdtYkgxHjAcBgkqhkiG9w0BCQEWD2luZm9AZGQtd3J0LmNvbTCCASIwDQYJ
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAO4z3MC/LtFVUzCfgLqZXJmeHw1Yo7Tb
vkxRkO+IvNXw0/nH881MXb4doGZ436m+sw+LGyfaoLSmytk9sjkXuwkRPQc1+EYP
iGKQHgr43pPM9VNg6Ya80HQtGQNQJNndd8J6pyTQKxBq18DI2D2kDm0eAf9Yk+Qc
2SwxSfncOuZ3Mu9zxdLDcNEQFB7SMCV1Qr8nG2x2/86ZrbnsyeLa4+yH8NwzBOZ5
G7HUFd2CEfQXkyCpKtI0ebHySDxZx6yyFmg1ueJTmom7hJXAnzqZFbQUKma+5C21
OUZDD+E8QxQEGPfiR4+apbZvp3Z8Ff5vTQMRyOjvgAtiCerKGFoN4i0CAwEAATAN
BgkqhkiG9w0BAQUFAAOCAQEASrDiC7UXN0JTvFOF+s1Wfdm3W9pAjwE5+en+szd5
9DLi3uFyy3InHItBoSermboSoP51GTkw4BMjnnqPLTS0lg491Rr9VdWracNcvn2c
s2r3jzf0TMlu8zZe6S+j/J785rprOIZe2HGRnj+ITgAyiQn/coNe68SY+/hU3TiZ
ffzq/tCSSD0tvfULu9lCk7PH8/BX9Na7188dc/GI6gpUOvTPh1V6eLePaWfE4fqo
1MGlydizOaGJ+WLOlsl68Zi1jyXkXxmPeiLLWUTHqw9+z4tfnwGmQUwrf2cZJH3X
/WkpgJP0nn7KMXk/EQYHLxrul9ohlYyFlEM0R6vzyx0T5Q==
-----END CERTIFICATE-----
---
Server certificate
subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
---
No client certificate CA names sent
---
SSL handshake has read 1124 bytes and written 478 bytes
---
New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : DES-CBC3-SHA
Session-ID: 03000000B764E206BFA03773FC339CD53E8D753B680EB6ABBB10B654962E0775
Session-ID-ctx:
Master-Key: F18F13BD37FD042D82EACABA8BDDFB2C0643DC960E109A3498A41265672CB86BFF48BC879979FAC5BC67965A27283C76
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1414564929
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
---
DONE
What's the difference with your previous bug 1089179?
Tests are in Aurora36
and clarification (I have 2 types of errors, 1 with old short keys, 1 with new long keys)
![]() |
||
Comment 6•10 years ago
|
||
f0rhum: Please keep the issue concerning key sizes to Bug 1084606, and avoid filing duplicate bugs for the same issues.
For this bug, please check if re-enabling SSL3 (e.g. via https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control ) will allow you to connect to the router - it looks like the new firmware only supports SSL3 for some reason, which is disabled by default on Firefox 34 and above.
Thanks.
Flags: needinfo?(f0rhum)
Comment 7•10 years ago
|
||
I seem to have hit this error connecting to bugzilla:
An error occurred during a connection to bugzilla.mozilla.org. Cannot communicate securely with peer: no common encryption algorithm(s). (Error code: ssl_error_no_cypher_overlap)
reloading the page fixed it
34.0a2 (2014-10-07)34.0a2 (2014-10-07) (Need to investigate why it isn't updating...)
Updated•10 years ago
|
Component: Security → Security: PSM
Product: Firefox → Core
(In reply to Cykesiopka from comment #6)
> f0rhum: Please keep the issue concerning key sizes to Bug 1084606, and avoid
> filing duplicate bugs for the same issues.
>
> For this bug, please check if re-enabling SSL3 (e.g. via
> https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control ) will
> allow you to connect to the router - it looks like the new firmware only
> supports SSL3 for some reason, which is disabled by default on Firefox 34
> and above.
>
> Thanks.
Cykesiopka, do I have some more info to provide or action to perform? I have a red button on top left of my bugzilla pages "Flags requested of you: need info (1)" redirecting me here where I see "cykesiopka.bmo: needinfo my@dres.s".
Flags: needinfo?(f0rhum)
![]() |
||
Comment 9•10 years ago
|
||
(In reply to f0rhum from comment #8)
> Cykesiopka, do I have some more info to provide or action to perform? I have
> a red button on top left of my bugzilla pages "Flags requested of you: need
> info (1)" redirecting me here where I see "cykesiopka.bmo: needinfo
> my@dres.s".
Hi f0rhum,
Yes. Please see Comment 6. It would be nice to get some confirmation about whether my hypothesis concerning SSL3 is correct.
Thanks!
Reporter | ||
Comment 10•10 years ago
|
||
The connection to xx.xx.xx.xx was interrupted while the page was loading.
This is with the latest Nightly e10s and SSL Version Control 0.3 set to ssl3
Comment 11•10 years ago
|
||
Does it have an effect to change the "security.tls.version.fallback-limit" value to 0 in about:config?
Reporter | ||
Comment 12•10 years ago
|
||
No, in 36.0a1 (2014-11-17) the error is now "The server presented a certificate with a key size that is too small to establish a secure connection. (Error code: mozilla_pkix_error_inadequate_key_size) " whatver security.tls.version.fallback-limit is 0 or 1.
Comment 13•10 years ago
|
||
(In reply to f0rhum from comment #12)
> No, in 36.0a1 (2014-11-17) the error is now "The server presented a
> certificate with a key size that is too small to establish a secure
> connection. (Error code: mozilla_pkix_error_inadequate_key_size) " whatver
> security.tls.version.fallback-limit is 0 or 1.
Probably because bug 1084606 landed in Nightly.
Comment 14•10 years ago
|
||
(In reply to f0rhum from comment #12)
> No, in 36.0a1 (2014-11-17) the error is now "The server presented a
> certificate with a key size that is too small to establish a secure
> connection. (Error code: mozilla_pkix_error_inadequate_key_size) " whatver
> security.tls.version.fallback-limit is 0 or 1.
Doesn't it still work after bug 1084606 is fixed with min version SSLv3 and security.tls.version.fallback-limit=0?
But dd-wrt should really fix their totally broken firmware. Have you filed a bug on their bug tracker?
Updated•10 years ago
|
Flags: needinfo?(f0rhum)
![]() |
||
Updated•10 years ago
|
Summary: ssl_error_no_cypher_overlap → ssl_error_no_cypher_overlap on certain DD-WRT firmware
Comment 16•10 years ago
|
||
I have this issue with older Cisco APs (1200 series) and APC UPS remote management cards.
Comment 17•10 years ago
|
||
(In reply to James N. Rzepka from comment #16)
> I have this issue with older Cisco APs (1200 series) and APC UPS remote
> management cards.
Please file a new bug.
Removing a misleading keyword ftom the bug summary.
Summary: ssl_error_no_cypher_overlap on certain DD-WRT firmware → Certain DD-WRT firmwares only support SSLv3 and/or TLS intolerant
Reporter | ||
Comment 18•10 years ago
|
||
Masatoshi Kimura, I let the "Clear needinfo..." checked and post some new info:
I hope this brings some light
With my updated FF (32 -> 35.0.1), with SSL Version Control 0.4 plugin set to SSL3 and accessing to some of my router I get an unspecified/generic error below (translated below):
"La connexion a été interrompue
La connexion avec chelle:18042 a été interrompue pendant le chargement de la page.
Le site est peut-être temporairement indisponible ou surchargé. Réessayez plus tard ;
Si vous n'arrivez à naviguer sur aucun site, vérifiez la connexion au réseau de votre ordinateur ;
Si votre ordinateur ou votre réseau est protégé par un pare-feu ou un proxy, assurez-vous que Firefox est autorisé à accéder au Web."
"The connection was interrupted
The connection to chelle:18042 was interrupted while the page was loading.
The site could be temporarily unavailable or too busy. Try again in a few moment.
If you are unable to browse any web site, check your computer's network connection.
If your computer or network is protected by a firewall or proxy, make sure that Firefox web access is allowed."
Here is a openssl s_client output:
openssl s_client -ssl3 -connect chelle:18042 -showcerts < /dev/null
CONNECTED(00000003)
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify return:1
---
Certificate chain
0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
---
No client certificate CA names sent
---
SSL handshake has read 730 bytes and written 286 bytes
---
New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
Server public key is 512 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : DES-CBC3-SHA
Session-ID: 0300000084B1F4ABFE2BC0829D61663A890C516349D62BA6F2A1795932858028
Session-ID-ctx:
Master-Key: BB7778F25DB61C64BAF1F1403ED4DE990EB0F0F749E4FE685B910F310734973DCD538E22179AA4AE30B1DE64434541C8
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1422875536
Timeout : 7200 (sec)
Verify return code: 18 (self signed certificate)
---
DONE
Same target, no specifying ssl3:
openssl s_client -connect chelle:18042 -showcerts < /dev/null
CONNECTED(00000003)
3078301896:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:177:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 213 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
Same target, removing any tls as of man s_client "Unfortunately there are still ancient and broken servers in use which cannot handle this technique and will fail to connect. Some servers only work if TLS is turned off.":
openssl s_client -no_tls1 -no_tls1_1 -no_tls1_2 -connect chelle:18042 -showcerts < /dev/null
CONNECTED(00000003)
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify return:1
---
Certificate chain
0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
---
No client certificate CA names sent
---
SSL handshake has read 730 bytes and written 286 bytes
---
New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
Server public key is 512 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : DES-CBC3-SHA
Session-ID: 04000000844B893E8D0B7ADFC12E5974B51F669ED9ECE820D5A4200F24321AF6
Session-ID-ctx:
Master-Key: 281CFFFDF2D00B18564870ECA7E88ABA557CC149746A8748B732C4E9C7E5F22CE7F82D7CBEC2468F3C746EFF0D733944
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1422876001
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
---
DONE
And a target that works (only with the plugin set to SSLv3):
Please note I do not filter any protocol here:
openssl s_client -connect chelle:18033 -showcerts < /dev/null
CONNECTED(00000003)
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = DE, ST = Saxon, L = Dresden, O = NewMedia-NET GmbH, OU = DD-WRT, CN = NewMedia-NET GmbH, emailAddress = info@dd-wrt.com
verify return:1
---
Certificate chain
0 s:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
i:/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
issuer=/C=DE/ST=Saxon/L=Dresden/O=NewMedia-NET GmbH/OU=DD-WRT/CN=NewMedia-NET GmbH/emailAddress=info@dd-wrt.com
---
No client certificate CA names sent
---
SSL handshake has read 730 bytes and written 361 bytes
---
New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
Server public key is 512 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : DES-CBC3-SHA
Session-ID: 03000000E9E92DBA972CAA6406C31F97B0E8D183D62D7762026B0EF85A71D040
Session-ID-ctx:
Master-Key: 8D902264ECEBB9D24E20C764AC0263D82808E333268A9E6E63C6BBF55A389ED707DD5F78E6DC8B7556F27A2C9757B6AA
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1422876115
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
---
DONE
Flags: needinfo?(f0rhum)
Comment 19•10 years ago
|
||
(In reply to f0rhum from comment #18)
> Masatoshi Kimura, I let the "Clear needinfo..." checked and post some new
> info:
> I hope this brings some light
> With my updated FF (32 -> 35.0.1), with SSL Version Control 0.4 plugin set
> to SSL3 and accessing to some of my router I get an unspecified/generic
> error below (translated below):
The SSL version control addon will not change "security.tls.version.fallback-limit". You will have to set the pref manually.
Updated•10 years ago
|
Blocks: POODLEBITE, TLS-Intolerance
Comment 20•10 years ago
|
||
Please see here
https://support.mozilla.org/en-US/questions/1045971
Comment 21•10 years ago
|
||
Perhaps it is a good idea, in the initial version of disabling non-secure fallback, to allow all IP addresses and/or all local IP address ranges to fallback. Then, after the feature has survived one version, it can be tightened up.
Comment 22•10 years ago
|
||
And allow SSLv3 (for this bug) and 512-bit RSA key (for the SuMo article in comment #20)? I'm not sure it's a good idea.
Comment 23•10 years ago
|
||
(In reply to Brian Smith (:briansmith, :bsmith, use NEEDINFO?) from comment #21)
> Perhaps it is a good idea, in the initial version of disabling non-secure
> fallback, to allow all IP addresses and/or all local IP address ranges to
> fallback. Then, after the feature has survived one version, it can be
> tightened up.
I expect that in relevant scenarios, attackers could fake local network resources (for sites which are in fact public) and thus get back fallback behavior.
Comment 24•10 years ago
|
||
(In reply to Florian Weimer from comment #23)
> I expect that in relevant scenarios, attackers could fake local network
> resources (for sites which are in fact public) and thus get back fallback
> behavior.
To clarify, I mean allow fallback for cases where the reference ID is an IP address, not a DNS name: e.g. allow fallback for https://192.168.0.1/ or https://[::1:2:3:4]/, but not https://example.com/ even if example.com resolves to 192.168.0.1.
This would solve the compatibility issue for all the "home router" scenerios, which are unlikely to be fixed any time soon.
Comment 25•10 years ago
|
||
Still, users will have to set "security.tls.version.min" and "security.tls.version.fallback-limit" to 0 unless we allow SSLv3 to IP addresses. And the latter will enable the non-secure fallback anyway. Moreover, I plan to remove SSLv3 support completely since Firefox 39 (bug 1106470).
I'm not sure it helps them much to allow non-secure fallbacks to IP addresses.
Comment 26•10 years ago
|
||
(In reply to Brian Smith (:briansmith, :bsmith, use NEEDINFO?) from comment #24)
> To clarify, I mean allow fallback for cases where the reference ID is an IP
> address, not a DNS name: e.g. allow fallback for https://192.168.0.1/ or
> https://[::1:2:3:4]/, but not https://example.com/ even if example.com
> resolves to 192.168.0.1.
>
> This would solve the compatibility issue for all the "home router"
> scenerios, which are unlikely to be fixed any time soon.
Not for all of them, only for a subset which does not encourage users to use an injected domain name (like “fritz.box”) or mDNS. I agree that doing this for IP address literals only would not be highly problematic, but it's not clear if that's worth the trouble.
Comment 27•10 years ago
|
||
We don't support SSLv3 anymore.
Status: UNCONFIRMED → RESOLVED
Closed: 10 years ago
Resolution: --- → WONTFIX
Reporter | ||
Comment 28•10 years ago
|
||
Could we hope we will see all these problems solved by adding the good old warnings and exceptions management moved the SSL-VERSION-CONTROL plugging, eventually with stronger warnings on install and usage (e.g. red instead of yellow)?
You need to log in
before you can comment on or make changes to this bug.
Description
•