+++ This bug was initially created as a clone of Bug #916226 +++ We need to back out the patch for bug 916226 until the patch for bug 919677 lands in mozilla-central.
Why does this depend on bug 912155? It would be better to back out the patch now, especially from m-a and m-b, because I think bug 912155 is likely to take a while to go through review, etc.
my bad.. bad bug.
Comment on attachment 816759 [details] [diff] [review] disable-aes-cgm-as-default [Approval Request Comment] Bug caused by (feature/regressing bug #): The landing of 916226 exposed bug 919677 in where the servers might get confused by the choice of ciphersuites. User impact if declined: Some servers might get confused if they partially understand TLS 1.2 and attempt to negotiate TLS1.2 ciphers on the TLS1.0 connections. Some sites might be unreachable. Testing completed (on m-c, etc.): landed on m-c and runs with default settings do no expose the new ciphersuites. Leaving the exact behavior as on FF 25. Risk to taking this patch (and alternatives if risky): None come to mind. String or IDL/UUID changes made by this patch: None
lsblack thanks for the approbal, but ryanvm backed out 916226 (https://bugzilla.mozilla.org/show_bug.cgi?id=916226#c15) yesterday night and this this patch is no longer needed on aurora.
There is no need for tracking for ff26 as ryanvm backed out the prereq and thus this fix is no longer needed
Is there any help needed for manual testing here? If yes can you please provide some steps in order to reproduce/verify this?
This is unfriendly.. but here it is: 1. Install tcpdump + wireshark on your local machine 2. Select a host (with a unique ip) that supports https 3. Start tcpdump collection for that ip saving collection to a file 4. Start firefox, change the security.tls.max.version (ensure that secuiry.tls.max.version is 1 (TLS 1.0). 5. Connect via https to the host you selected 6. stop firefox 7. Stop your collector 8. open wireshark with the file collected via tcpdmump 9. Inside the the client-hello message (should be the first data package from the dump (4th package in the conversiation) look inse the SSL->TLS v1.0 record layer-> handhsake protocol: Client Hello -> Cipher suites. The AES GCM ciphers should not be listed. You could do the colletion inside wireshark directly, but that could be unsafe.
Created attachment 828590 [details] tcpdump testing log Thanks Camilo for helping, I was able to reproduce the issue on a older nightly build (AES GCM ciphers appear there), on latest Aurora 27.0a2 I am not seeing listed any AES GCM ciphers. Here is the log file received from tcpdump. Based on this I`m setting this verified as fixed.