Establish deprecation date for DHE cipher suites in Firefox
Categories
(Core :: Security: PSM, task, P1)
Tracking
()
People
(Reporter: ht16cq+b33nskirkppis, Assigned: jan)
References
(Blocks 1 open bug)
Details
(Keywords: site-compat, Whiteboard: [psm-deprecation][psm-assigned])
Attachments
(1 file)
47 bytes,
text/x-phabricator-request
|
jcristau
:
approval-mozilla-beta+
|
Details | Review |
Comment 1•6 years ago
|
||
Updated•6 years ago
|
Reporter | ||
Comment 2•6 years ago
|
||
Reporter | ||
Comment 5•6 years ago
|
||
Any thoughts on fixing this?
Reporter | ||
Comment 6•5 years ago
|
||
Firefox has now removed support for TLSv1.0 and TLSv1.1. How about fixing this as well? It remains one of the biggest and oldest (5 years) vulnerabilities in Firefox.
Assignee | ||
Comment 8•5 years ago
•
|
||
Firefox does not support AEAD DHE by reason. Requiring 2048 bit DHE could prevent connections to ancient devices. It's "better" to use 2048 bit plain RSA instead of using 1024 bit DHE or being unable to connect. Chrome, Android, Googlebot, Edge, Safari and Servo do not support DHE anymore.
Telemetry: Ciphersuites 21 and 23 on SSL_CIPHER_SUITE_FULL.
Assignee | ||
Comment 9•5 years ago
|
||
Updated•5 years ago
|
Assignee | ||
Updated•5 years ago
|
Updated•5 years ago
|
Comment 10•4 years ago
|
||
Turns out we're moving forward with this, so since this patch still applies cleanly, I'm going to check it in.
Comment 11•4 years ago
|
||
Comment 12•4 years ago
|
||
bugherder |
Comment 13•4 years ago
|
||
Posted a site compatibility note for the change.
Comment 14•4 years ago
|
||
Comment on attachment 9132327 [details]
Bug 1496639 - Disable DHE ciphers by default. r?keeler
Beta/Release Uplift Approval Request
- User impact if declined: DHE-based ciphersuites are deprecated and don't sufficiently protect our users. We want this to get into the next ESR, hence the uplift request.
- Is this code covered by automated tests?: Yes
- Has the fix been verified in Nightly?: Yes
- Needs manual test from QE?: No
- If yes, steps to reproduce:
- List of other uplifts needed: None
- Risk to taking this patch: Low
- Why is the change risky/not risky? (and alternatives if risky): A canary run in bug 1643286 showed no regressions, and Chrome has already disabled these ciphersuites, so this should be safe.
- String changes made/needed:
Assignee | ||
Updated•4 years ago
|
Updated•4 years ago
|
Updated•4 years ago
|
Comment 16•4 years ago
|
||
[Tracking Requested - why for this release]:
Comment 17•4 years ago
|
||
firefox-esr68 --- unaffected
ESR 68 does have DHE suites enabled by default, so shouldn't that be "wontfix" or "affected" rather than "unaffected"?
Comment 18•4 years ago
|
||
(In reply to hotaru from comment #17)
firefox-esr68 --- unaffected
ESR 68 does have DHE suites enabled by default, so shouldn't that be "wontfix" or "affected" rather than "unaffected"?
It should indeed be wontfix
, as I don't think anyone would take kindly to pulling ciphersuites out in point releases of ESR 68u nless they were completely broken. But we do intend to make this change for ESR 78.
Updated•4 years ago
|
Comment 19•4 years ago
|
||
Comment on attachment 9132327 [details]
Bug 1496639 - Disable DHE ciphers by default. r?keeler
approved for 78.0b9
Comment 20•4 years ago
|
||
Is this worth a mention in release notes for fx78? Please set the relnote-firefox flag to "?" in that case.
Comment 21•4 years ago
|
||
Release Note Request (optional, but appreciated)
[Why is this notable]: Disabling DHE ciphersuites could have a compatibility impact
[Affects Firefox for Android]: yes
[Suggested wording]: As part of our ongoing effort to deprecate obsolete cryptography, we have disabled all remaining DHE-based TLS ciphersuites by default.
[Links (documentation, blog post, etc)]:
Comment 22•4 years ago
|
||
bugherder uplift |
Comment 23•4 years ago
•
|
||
Updated the site compatibility note.
Description
•