Bug 1487607
Summary: | openssl: doesn't apply all aspects of crypto policies | |||
---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Ondřej Lysoněk <olysonek> | |
Component: | openssl | Assignee: | Tomas Mraz <tmraz> | |
Status: | CLOSED RAWHIDE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 28 | CC: | cfergeau, jorton, jpokorny, nmavrogi, ppisar, tmraz | |
Target Milestone: | --- | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | openssl-1.1.1-0.pre8.3.fc29 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1591619 1614719 (view as bug list) | Environment: | ||
Last Closed: | 2018-08-13 15:20:16 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1527031, 1591619 |
Description
Ondřej Lysoněk
2017-09-01 11:39:00 UTC
This is unfortunately a known issue that we are trying to address. Currently the openssl library doesn't provide any knobs for us to use to disable the protocol for multiple applications. I thought so. Could you document it as a known issue until it's fixed? I didn't see any note about it anywhere. re-titled for clarity. In short what we need from openssl to provide the strong system-wide defaults are: * Be able to configure protocol version system-wide * Be able to configure limits on RSA/FFDHE algorithms * Be able to configure allowed curves for key exchange It seems openssl tool even does not honor DEFAULT cipher list by default (openssl-1.1.0g-2.fc28.x86_64). As expected, this fails to connect because DEFAULT does not contain DES-CBC3-SHA required by the server: $ openssl s_client -connect www.halstead.com:443 -cipher DEFAULT But this surprisingly connects: $ openssl s_client -connect www.halstead.com:443 In my opinion these two commands should behave identically. No, if you explicitly specify DEFAULT, it uses the built-in library default and does not apply crypto policies. (In reply to Tomas Mraz from comment #5) > No, if you explicitly specify DEFAULT, it uses the built-in library default > and does not apply crypto policies. Right. 3DES-CBC will be removed from the crypto policies on F28 https://fedoraproject.org/wiki/Changes/StrongCryptoSettings Ok. OpenSSL's DEFAULT and crypto-policy's DEFAULT are two different defaults. I understand. Is DES-CBC3 and 3DES-CBC the same ciphersuite? I don't think. DES has already been excluded from crypto-policy's DEFAULT, yet: $ openssl ciphers | tr ':' "\n" |grep '^DES-CBC3-SHA$' DES-CBC3-SHA and the openssl s_client without explic -cipher arguemnt succeeds. Why? (In reply to Petr Pisar from comment #7) > Ok. OpenSSL's DEFAULT and crypto-policy's DEFAULT are two different > defaults. I understand. > > Is DES-CBC3 and 3DES-CBC the same ciphersuite? Yes. DES-CBC3 it's openssl's way of saying 3DES-CBC. This bug appears to have been reported against 'rawhide' during the Fedora 28 development cycle. Changing version to '28'. |