RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1169871 - Default configuration enables SSL3
Summary: Default configuration enables SSL3
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: mod_nss
Version: 7.1
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Matthew Harmsen
QA Contact: Kaleem
URL:
Whiteboard:
Depends On: 1166316 1169870
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-12-02 15:16 UTC by Martin Poole
Modified: 2015-03-05 13:34 UTC (History)
7 users (show)

Fixed In Version: mod_nss-1.0.8-33.el7
Doc Type: Bug Fix
Doc Text:
Clone Of: 1169870
Environment:
Last Closed: 2015-03-05 13:34:55 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Default NSSProtocol patch (659 bytes, patch)
2015-01-05 21:57 UTC, Matthew Harmsen
rcritten: review-
Details | Diff
Default NSSProtocol patch (spec file) (17.06 KB, text/plain)
2015-01-05 21:59 UTC, Matthew Harmsen
no flags Details
Default NSSProtocol patch (revised) (1.42 KB, patch)
2015-01-06 18:12 UTC, Matthew Harmsen
rcritten: review+
Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2015:0605 0 normal SHIPPED_LIVE mod_nss bug fix update 2015-03-05 17:19:40 UTC

Description Martin Poole 2014-12-02 15:16:04 UTC
+++ This bug was initially created as a clone of Bug #1169870 +++

Description of problem:

The default nss.conf enables SSL3

    NSSProtocol SSLv3,TLSv1.0,TLSv1.1


Version-Release number of selected component (if applicable):

    mod_nss-1.0.8-32.el7.x86_64

Comment 1 Matthew Harmsen 2014-12-16 01:43:17 UTC
The RHEL 6.7 equivalent of this bug, 'Bugzilla Bug #1160870 - Default configuration enables SSL3' was marked as a duplicate of 'Bugzilla Bug #1166316 - Rebase mod_nss to support TLSv1.2' (RHEL 6.7), I did mark that as a part of the fix for this bug,  the 'SSLv3,' string should be removed from the 'NSSProtocol SSLv3,TLSv1.0,TLSv1.1' line in the default 'nss.conf' file.

The difference as to why this bug should not be handled in the same manner, however, is that 'Bugzilla Bug #1160745 - RFE: add TLSv1.2 support to mod_nss' (the equivalent to RHEL 6.7 Bugzilla Bug #1166316) has been slated to not be fixed until RHEL 7.2, and it seems that if the appropriate ACKS can be obtained for this bug, it could be addressed in the RHEL 7.1 timeframe by the following simple change to the default 'nss.conf' file:

Change the 'nss.conf' line:

    NSSProtocol SSLv3,TLSv1.0,TLSv1.1

to:

    NSSProtocol TLSv1.0,TLSv1.1

Comment 2 Matthew Harmsen 2015-01-05 21:57:52 UTC
Created attachment 976632 [details]
Default NSSProtocol patch

Remove 'SSLv3' from the default NSSProtocol list defined in 'nss.conf'.

Comment 3 Matthew Harmsen 2015-01-05 21:59:28 UTC
Created attachment 976633 [details]
Default NSSProtocol patch (spec file)

Accompanying spec file for 'mod_nss-default-NSSProtocol.patch'.

Comment 4 Rob Crittenden 2015-01-05 22:59:35 UTC
Comment on attachment 976632 [details]
Default NSSProtocol patch

If for some reasaon there is no NSSProtocol setting then it will fall back to its defaults which currently includes ssl3 I think you want this change as well:

--- a/nss_engine_init.c
+++ b/nss_engine_init.c
@@ -646,9 +646,9 @@ static void nss_init_ctx_protocol(server_rec *s,
     } else {
         if (mctx->auth.protocols == NULL) {
             ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s,
-                "%s value not set; using: SSLv3, TLSv1.0, TLSv1.1 and TLSv1
.2",
+                "%s value not set; using: TLSv1.0, TLSv1.1 and TLSv1.
2",
                 protocol_marker);
-            ssl3 = tls = tls1_1 = tls1_2 = 1;
+            tls = tls1_1 = tls1_2 = 1;
         } else {
             lprotocols = strdup(mctx->auth.protocols);
             ap_str_tolower(lprotocols);

Comment 7 Matthew Harmsen 2015-01-06 18:12:32 UTC
Created attachment 976903 [details]
Default NSSProtocol patch (revised)

Thanks Rob -- good catch!

Note that this change does not include TLS v1.2 since this version of mod_nss on RHEL 7.1 does not yet include a TLS v1.2 implementation.

Comment 8 Rob Crittenden 2015-01-06 18:51:30 UTC
Comment on attachment 976903 [details]
Default NSSProtocol patch (revised)

LGTM

Comment 11 Jenny Severance 2015-01-20 18:43:15 UTC
# cat /etc/redhat-release 
Red Hat Enterprise Linux Server release 7.1 Beta (Maipo)



# cat /etc/httpd/conf.d/nss.conf | grep NSSProtocol
#   middle of a range may be excluded, the entry "NSSProtocol SSLv3,TLSv1.1"
#   is identical to the entry "NSSProtocol SSLv3,TLSv1.0,TLSv1.1".
NSSProtocol TLSv1.0,TLSv1.1

# rpm -qi mod_nss
Name        : mod_nss
Version     : 1.0.8
Release     : 33.el7
Architecture: x86_64
Install Date: Wed 14 Jan 2015 04:08:08 PM EST
Group       : System Environment/Daemons
Size        : 268214
License     : ASL 2.0
Signature   : RSA/SHA256, Thu 08 Jan 2015 11:20:12 AM EST, Key ID 938a80caf21541eb
Source RPM  : mod_nss-1.0.8-33.el7.src.rpm
Build Date  : Tue 06 Jan 2015 03:56:41 PM EST
Build Host  : x86-018.build.eng.bos.redhat.com
Relocations : (not relocatable)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
Vendor      : Red Hat, Inc.
URL         : http://directory.fedoraproject.org/wiki/Mod_nss
Summary     : SSL/TLS module for the Apache HTTP server
Description :
The mod_nss module provides strong cryptography for the Apache Web
server via the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols using the Network Security Services (NSS)
security library.

Comment 13 errata-xmlrpc 2015-03-05 13:34:55 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-0605.html


Note You need to log in before you can comment on or make changes to this bug.