Open
Bug 973713
Opened 12 years ago
Updated 2 years ago
Need way for SSL server cipher preference to override client preference
Categories
(NSS :: Libraries, enhancement, P3)
NSS
Libraries
Tracking
(Not tracked)
NEW
People
(Reporter: chris.newman, Unassigned)
Details
Older SSL clients (including older NSS clients like Firefox and Thunderbird) may support stronger cipher suites but have a client order that prefers weak/fast cipher suites. If NSS had an option to ignore the client cipher preference order and apply the server's preference order, that would allow site administrators to upgrade security for end-users in a consistent way without breaking compatibility with older clients lacking the stronger cipher suites.
OpenSSL has an option SSL_OP_CIPHER_SERVER_PREFERENCE to do this:
https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html
Comment 1•12 years ago
|
||
(In reply to Chris Newman from comment #0)
> Older SSL clients (including older NSS clients like Firefox and Thunderbird)
> may support stronger cipher suites but have a client order that prefers
> weak/fast cipher suites. If NSS had an option to ignore the client cipher
> preference order and apply the server's preference order, that would allow
> site administrators to upgrade security for end-users in a consistent way
> without breaking compatibility with older clients lacking the stronger
> cipher suites.
>
> OpenSSL has an option SSL_OP_CIPHER_SERVER_PREFERENCE to do this:
> https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html
I propose that, instead of having an option, we just make the default behavior of the server side of libssl to always choose a cipher suite based on its own preferences. I would be fine with this since Firefox (and soon Chrome, maybe?) would be using the same preferences anyway. It would be simpler to implement and with the new default (only) cipher suite preference order in NSS, it would improve security.
Version: 3.15.4 → trunk
Comment 2•11 years ago
|
||
see also Bug 949564
Updated•3 years ago
|
Severity: normal → S3
Updated•2 years ago
|
Severity: S3 → N/A
Priority: -- → P3
You need to log in
before you can comment on or make changes to this bug.
Description
•