Bug 1091316
Summary: | Net::LDAP should not set ciphers to 'ALL' if not requested explicitly | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Petr Pisar <ppisar> | ||||||
Component: | perl-LDAP | Assignee: | Petr Pisar <ppisar> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Jaroslav Aster <jaster> | ||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | unspecified | ||||||||
Version: | 7.1 | CC: | antti, ddas, gabe.fahl, jaster, john.a.wagner, perl-maint-list, ppisar, psabata, rmainz, tmraz | ||||||
Target Milestone: | rc | Keywords: | Patch | ||||||
Target Release: | --- | ||||||||
Hardware: | x86_64 | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | perl-LDAP-0.56-3.el7 | Doc Type: | Bug Fix | ||||||
Doc Text: |
Cause:
Using Net::LDAPS Perl module to connect to an LDAP server
without specifying list of allowed SSL ciphers by
`ciphers'.
Consequence:
The SSL client offers and accepts all SSL ciphers, even
that which are not enabled by default by the underlying
cryptographic (OpenSSL) library.
Fix:
Net::LDAP code and documentation have been modified not
to request all ciphers by default.
Result:
Perl LDAP clients will use default OpenSSL cipher list if
not specified explicitly otherwise.
|
Story Points: | --- | ||||||
Clone Of: | 1090966 | ||||||||
: | 1127322 (view as bug list) | Environment: | |||||||
Last Closed: | 2015-03-05 07:13:34 UTC | Type: | Bug | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | |||||||||
Bug Blocks: | 1113520 | ||||||||
Attachments: |
|
Description
Petr Pisar
2014-04-25 11:03:48 UTC
Patch has been accepted by upstream into perl-ldap-0.63 with commit: commit 11fe2a9a653ae45ce597e779a44ca42c0b080640 Author: Petr Písař <ppisar> Date: Thu Apr 24 15:51:01 2014 +0200 Do not set SSL_ciphers to ALL by default Created attachment 924484 [details]
Upstream fix ported to 0.56
Created attachment 924493 [details]
Correction for the fix ported to 0.56
See bug #1090966 for testing instructions. However please note that current IO::Socket:SSL Perl module (perl-IO-Socket-SSL-1.94-3.el7.noarch) does not respect OpenSSL defaults and overrides it: SSL_cipher_list If this option is set the cipher list for the connection will be set to the given value, e.g. something like 'ALL:!LOW:!EXP:!ADH'. Look into the OpenSSL documentation (<http://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS>) for more details. If this option is not set 'ALL:!LOW' will be used. To use OpenSSL builtin default (whatever this is) set it to ''. This undermines this perl-Net-LDAP fix and causes sneaking some ciphers into Net::LDAP application: --- default.sorted 2014-08-06 16:36:58.176000000 +0200 +++ fixed.sorted 2014-08-06 16:35:23.573000000 +0200 @@ -1,3 +1,18 @@ +ADH-AES128-GCM-SHA256 +ADH-AES128-SHA +ADH-AES128-SHA256 +ADH-AES256-GCM-SHA384 +ADH-AES256-SHA +ADH-AES256-SHA256 +ADH-CAMELLIA128-SHA +ADH-CAMELLIA256-SHA +ADH-DES-CBC3-SHA +ADH-RC4-MD5 +ADH-SEED-SHA +AECDH-AES128-SHA +AECDH-AES256-SHA +AECDH-DES-CBC3-SHA +AECDH-RC4-SHA AES128-GCM-SHA256 AES128-SHA AES128-SHA256 @@ -59,17 +74,15 @@ ECDH-RSA-RC4-SHA EDH-DSS-DES-CBC3-SHA EDH-RSA-DES-CBC3-SHA +EXP-ADH-DES-CBC-SHA +EXP-ADH-RC4-MD5 +EXP-DES-CBC-SHA +EXP-EDH-DSS-DES-CBC-SHA +EXP-EDH-RSA-DES-CBC-SHA +EXP-RC2-CBC-MD5 +EXP-RC4-MD5 IDEA-CBC-SHA -KRB5-DES-CBC3-MD5 -KRB5-DES-CBC3-SHA -KRB5-IDEA-CBC-MD5 -KRB5-IDEA-CBC-SHA -KRB5-RC4-MD5 -KRB5-RC4-SHA - -3DES-EDE-CBC-SHA -PSK-AES128-CBC-SHA -PSK-AES256-CBC-SHA -PSK-RC4-SHA RC4-MD5 RC4-SHA SEED-SHA The erroneous cipher-suites are the ADH and AECDH and EXP ones. I will report bug against perl-IO-Socket-SSL. (The KRB5 and PSK ones are not present in the Net::LDAP client because no Kerberos, nor PSK TLS authentication has been available when running the client. These misses are fine.) The perl-IO-Socket-SSL issue cloned as bug #1127322. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-0333.html |