Closed
Bug 1386908
Opened 8 years ago
Closed 8 years ago
Disable 3DES in TLS Handshake for early beta builds
Categories
(Core :: Security: PSM, defect, P1)
Tracking
()
RESOLVED
WONTFIX
Future
People
(Reporter: jcj, Assigned: jcj)
References
Details
(Keywords: site-compat)
Bug 1386754 disabled 3DES in the TLS handshake in Nightly. This bug is to (eventually) do so in Beta as well.
Assignee | ||
Updated•8 years ago
|
Status: NEW → ASSIGNED
Comment 1•8 years ago
|
||
See bug 1386754 comment 10. This bug looks a dupe of bug 1386754 for me.
Assignee | ||
Comment 2•8 years ago
|
||
Basically, change from enabling 3DES in BETA_OR_RELEASE to disabling for EARLY_BETA_OR_EARLIER. (Thanks, :emk!)
Summary: Disable 3DES in TLS Handshake for non-release builds → Disable 3DES in TLS Handshake for early beta builds
Comment 3•8 years ago
|
||
Starting to collect some sites that are known to affect users. Someone in #security today was noting that they can't access client00.chat.mibbit.com.
https://www.ssllabs.com/ssltest/analyze.html?d=client00.chat.mibbit.com indicates that it actually does support some other ciphersuites, though none which overlap with us. It also has tons of insecure settings.
![]() |
||
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/8743
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/8952
![]() |
||
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9030
![]() |
||
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9047
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9155
![]() |
||
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9140
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9177
Comment 4•8 years ago
|
||
The Wall Street Journal's subscribe page is affected by this. https://subscribe.wsj.com
![]() |
||
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9477
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9685
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9675
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9672
Updated•8 years ago
|
See Also: → https://webcompat.com/issues/9857
Comment 5•8 years ago
|
||
Also https://wlcsplash.airnz.co.nz/ (used in their captive portal in lounges)
Assignee | ||
Comment 6•8 years ago
|
||
We knew the TLS Canary wouldn't reveal the whole story as to what sites' we'd cause breakage for when disabling 3DES, so it's very good to know the list of webcompat issues that have been filed. :keeler, :mwobensmith and I want to thank all the people who helped us evaluate the long-tail of 3DES usage out there.
As 3DES is not known to be insecure, even though it's a legacy cipher, we're turning it back on in Bug 1405511.
Future discussions about deprecation timelines can now work with the August-October 2017 telemetry and webcompat issues as part of the decision-making process (See Bug 1227524).
Resolving WONTFIX.
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
Resolution: --- → WONTFIX
3DES is also not known to be very secure. I think awarding a 3DES site (or similarly weak ciphers) a regular green padlock without any warning is problematic.
Some other ideas short of disabling 3DES:
1. Was there ever any discussion about a "[x] I don't want sham cipher security" setting that people can turn on that don't care about compatibility with badly configured sites that much?
2. Another alternative would be something Chrome sometimes does, which is letting people connect but use a non-green red striked padlock to indicate the connection to the site is not secure (similar to what firefox does with non-HTTPS password fields). This wouldn't make it impossible to use the site, but it would pressure site owners to fix their server config and make it obvious to the user that there is no proper security established.
Comment 8•8 years ago
|
||
(In reply to jonas from comment #7)
> 3DES is also not known to be very secure. I think awarding a 3DES site (or
> similarly weak ciphers) a regular green padlock without any warning is
> problematic.
>
> Some other ideas short of disabling 3DES:
> [...]
>
> 2. Another alternative would be something Chrome sometimes does, which is
> letting people connect but use a non-green red striked padlock to indicate
> the connection to the site is not secure (similar to what firefox does with
> non-HTTPS password fields). This wouldn't make it impossible to use the
> site, but it would pressure site owners to fix their server config and make
> it obvious to the user that there is no proper security established.
identity ui: Non-PFS should be called as weak encryption (yellow triangle)
bug 1353710 comment 2
You need to log in
before you can comment on or make changes to this bug.
Description
•