Unappropriate TLS config on accounts.firefox.com
Categories
(Cloud Services :: Server: Firefox Accounts, task)
Tracking
(Not tracked)
People
(Reporter: jan, Unassigned)
References
Details
(Keywords: nightly-community, Whiteboard: [fxa-waffle-ignore])
Comment 1•7 years ago
|
||
Comment 3•7 years ago
|
||
Comment 4•7 years ago
|
||
Comment hidden (typo) |
Reporter | ||
Comment 9•7 years ago
|
||
Comment 10•7 years ago
|
||
![]() |
||
Comment 11•7 years ago
|
||
Comment 12•7 years ago
|
||
Reporter | ||
Comment 13•7 years ago
|
||
Comment 14•7 years ago
|
||
Comment 15•7 years ago
|
||
Comment 16•7 years ago
|
||
Updated•7 years ago
|
Comment 17•6 years ago
|
||
- Remove the use of the DHE-RSA-AES128-SHA cipher on November 1st 2018 by switching to the 2016-08 ELB security policy
Did we do this and can now close out this bug?
Re-running the hardenize report from Comment 0 seems to show a lot of green and no orange or red.
Comment 18•6 years ago
|
||
Yep, this was done on 2019-03-26.
Reporter | ||
Comment 19•6 years ago
|
||
https://www.hardenize.com/report/accounts.firefox.com#www_tls
Confirmed this step, you've deployed predefined policy 2016-08 and safely dropped support for DHE. Thank you!
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/ssl-config-update.html
Now please configure a custom policy for accounts.firefox.com that removes support for non-PFS ciphersuites (plain RSA):
SSL Protocols [x] TLS 1.0
[x] TLS 1.1
[x] TLS 1.2
SSL Options [ ] (No server order preference, as AWS enforces the following HTTP2-unfriendly ciphersuite order:)
SSL Ciphers [x] ECDHE-RSA-AES128-GCM-SHA256 (supported with TLS 1.2 since Firefox 27)
[x] ECDHE-RSA-AES128-SHA
[x] ECDHE-RSA-AES256-GCM-SHA384
[x] ECDHE-RSA-AES256-SHA (i.e. supported with TLS 1.0 by Firefox 4.0 build 2010-12-12 and by Android 4.0.4)
Risk: Small. This could break clients who use (in)security software to scan their connections, and only if that software is old, buggy and only supports plain RSA. That is a security problem of its own, affecting other services as well, noticing is desired and users should be advised to uninstall or update such software.
Background of the general deprecation process:
https://blog.mozilla.org/security/2018/10/15/removing-old-versions-of-tls/
TLS 1.0 and TLS 1.1 will be disabled with Nightly 72 or 73 in 5-7 months and ride the trains.
Reporter | ||
Updated•4 years ago
|
Description
•