Closed Bug 1600437 Opened 5 years ago Closed 2 years ago

Consider removing ECDSA_SHA1 signature algorithm

Categories

(Core :: Security: PSM, task, P1)

task

Tracking

()

RESOLVED FIXED
109 Branch
Tracking Status
firefox109 --- fixed

People

(Reporter: jan, Assigned: jan, NeedInfo)

References

Details

(Keywords: dev-doc-needed, nightly-community, parity-chrome, Whiteboard: [psm-assigned][psm-deprecation])

Attachments

(1 file)

(bug 1600449 is about showing a warning message for RSA_PKCS1_SHA1 as it can't be removed yet.)

See Also: → 1600449

Marking for 3.50 in Q1

Priority: -- → P2
Target Milestone: --- → 3.50

I guess this also means that ECDHE-ECDSA-AES256-SHA and ECDHE-ECDSA-AES128-SHA couldn't be used with TLS 1.0 and 1.1 anymore.
Chrome completely removed them in 2016 and I removed them from Servo, too, as they are unused:
Ciphersuites 4 and 6 on SSL_CIPHER_SUITE_FULL (even less with Nightly).

This patch should remove SHA1/ECDSA from TLS 1.2.
https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html.

Assignee: nobody → jan
Severity: normal → N/A
Component: Libraries → Security: PSM
Priority: P2 → P1
Product: NSS → Core
Whiteboard: [psm-assigned][psm-deprecation]
Target Milestone: 3.50 → ---
Version: trunk → unspecified

There's a r+ patch which didn't land and no activity in this bug for 2 weeks.
:jan, could you have a look please?
If you still have some work to do, you can add an action "Plan Changes" in Phabricator.
For more information, please visit auto_nag documentation.

Flags: needinfo?(nkulatova)
Flags: needinfo?(jan)
Attachment #9130559 - Attachment description: Bug 1600437 - Disable CBC-mode ECDSA ciphers and stop advertising ECDSA+SHA1 signature algorithm. → Bug 1600437 - Disable CBC-mode ECDSA ciphers and stop advertising ECDSA+SHA1 signature algorithm. r=nkulatova

rebased.

Flags: needinfo?(nkulatova)
Flags: needinfo?(jan)
Pushed by archaeopteryx@coole-files.de: https://hg.mozilla.org/integration/autoland/rev/d0ac295c1b62 Disable CBC-mode ECDSA ciphers and stop advertising ECDSA+SHA1 signature algorithm. r=nkulatova
Keywords: dev-doc-needed
Status: NEW → RESOLVED
Closed: 2 years ago
Resolution: --- → FIXED
Target Milestone: --- → 109 Branch

Could this possibly be backported to esr102?

We generally don't backport patches with potential compatibility risks to ESR. If you're wanting to take this for TBB, a previous revision of the patch probably applies cleanly, if the current one doesn't.

Flags: needinfo?(kaie)
Duplicate of this bug: 1325257
Blocks: 1802319

(I'm not a cryptographer.)

Overview:

What MDN documentation do you think might be needed for this? The only mention I can find of ECDSA SHA1 I was able to find was below this heading: EcdsaParams (this is passed in SubtleCrypto).

Warning: SHA-1 is also supported here but the SHA-1 algorithm is considered vulnerable and should no longer be used.

We don't seem to track other specific information about supported algorithms, so I don't think there is anything here to do. I guess we might change that note to

Warning: SHA-1 may be supported in some browsers but the SHA-1 algorithm is considered vulnerable and should not be used even if supported.

Can you confirm?

Flags: needinfo?(jan)

(In reply to Hamish Willee from comment #14)
This has nothing to do with WebCrypto. This is only about TLS (https).
MDN was never that precise. A handshake signature is not something that regular web developers can configure in their web server.
Firefox' client-side ciphersuites don't seem to be officially documented.
There is only a recommendation for servers: https://wiki.mozilla.org/Security/Server_Side_TLS
This page is just a general overview: https://developer.mozilla.org/en-US/docs/Web/Security/Transport_Layer_Security
I don't really know what dev-doc-needed should mean other than an "Intent to Unship: ECDSA CBC ciphersuites and ECDSA_SHA1 handshake signature" (text: Firefox deprecates the same as Chromium.) email in Google Groups? A decision maker should do that if it's appropriate.
https://wiki.mozilla.org/ExposureGuidelines#Intent_to_unship
https://groups.google.com/a/mozilla.org/g/dev-platform

Flags: needinfo?(jan)
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: