Bug 1005611
Summary: | BEAST workaround not enabled in Firefox | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Cesar Eduardo Barros <cesarb> |
Component: | firefox | Assignee: | Martin Stransky <stransky> |
Status: | CLOSED RAWHIDE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 19 | CC: | emaldona, hkario, mattdm, pbrobinson, sparks, ssorce, stransky |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | mattdm:
fedora_requires_release_note+
|
Hardware: | x86_64 | ||
OS: | Linux | ||
URL: | https://bugzilla.mozilla.org/show_bug.cgi?id=665814 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-10-17 10:32:27 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Cesar Eduardo Barros
2013-09-08 23:55:53 UTC
(In reply to Cesar Eduardo Barros from comment #0) > Recompiling nss with patch 29 commented out > (nss-ssl-cbc-random-iv-off-by-default.patch) fixes the bug, but probably > reintroduces bug 770682. CCing NSS maintainer to see when we're finally dropping that patch. It is still applied in F19, I though it was supposed to be gone by now. > It seems to be possible for firefox to force the workaround to be enabled, > even if it is off by default. A comment at > https://bugzilla.mozilla.org/show_bug.cgi?id=723109 mentions a SSL_OptionSet > function which appears to be able to disable or enable the workaround > directly. Another option would be to fudge the environment before calling > any function of the NSS library, forcing NSS_SSL_CBC_RANDOM_IV=1 on the > environment unless it already has a NSS_SSL_CBC_RANDOM_IV with any value. This is already done in firefox and thunderbird packages in Red Hat Enterprise Linux 5 and 6 using the following in the launcher shell script: # BEAST fix (rhbz#838879) NSS_SSL_CBC_RANDOM_IV=${NSS_SSL_CBC_RANDOM_IV-1} export NSS_SSL_CBC_RANDOM_IV https://bugzilla.redhat.com/show_bug.cgi?id=737506#c36 https://bugzilla.redhat.com/show_bug.cgi?id=838879 Fedora 18 is also affected. I bit of information from the nss side of things. The nss disabling patch is not applied on Rawhide or f20, onlt applied on stable branches. After we branch Rawhide for the next fedora release and we enter in Alpha, I send emails to the fedora development mailing list telling them that NSS_SSL_CBC_RANDOM_IV=1 will be the default as they use updates-testing and ask for feedback on whether it causes problems. Twice they have said it still causes problems. There are still unpatches servers out there. Once we go beta I have to enable the patch again. f20 is entering Alpha soon so I'll send that email again. I know this bug is for Firefox but I though worth informing you that we monitor this every six months for nss. Elio, sorry but this is backwards. The default should be secure, and then if some applications tiull have issues they can add setenv("NSS_SSL_CBC_RANDOM_IV", "0", 1); as a patch until things work. We shouldn't make *all* applications vulnerable because a handful have issues. See https://fedorahosted.org/fesco/ticket/1181 and the fesco meeting log. We'd like this to be applied in F20 and also as an update to F19 to go into updates-testing. I think this probably also could use a release note. Elio, do you have some text for that? On the devel mailing list you note: > Also, the notes in the Bodhi update should be very clear and explain that > user that, for reasons of compatibility, needs to opt out of the more > secure default can do so by setting the environment variable > NSS_SSL_CBC_RANDOM_IV=0. Is there anything more to say? Please note that this bug is about Firefox. I'll update Firefox/Thunderbird with the BEAST workaround we already have in RHEL: # BEAST fix (rhbz#838879) NSS_SSL_CBC_RANDOM_IV=${NSS_SSL_CBC_RANDOM_IV:-1} export NSS_SSL_CBC_RANDOM_IV For other packages or default NSS setup please file another bug. Actually, the right one is ${NSS_SSL_CBC_RANDOM_IV-1} because we don't want to perform null test. |