Closed
Bug 1083058
Opened 10 years ago
Closed 10 years ago
A pref to control TLS version fallback
Categories
(Core :: Security: PSM, defect)
Core
Security: PSM
Tracking
()
VERIFIED
FIXED
mozilla36
People
(Reporter: mt, Assigned: mt)
References
Details
Attachments
(2 files)
(deleted),
patch
|
mt
:
review+
lsblakk
:
approval-mozilla-aurora+
|
Details | Diff | Splinter Review |
(deleted),
patch
|
mt
:
review+
lsblakk
:
approval-mozilla-beta+
|
Details | Diff | Splinter Review |
A patch to control TLS version fallback was developed in response to bug 1076983. We ultimately decided to disable SSLv3 entirely, but the feature is still useful.
Assignee | ||
Comment 1•10 years ago
|
||
Assignee: nobody → martin.thomson
Assignee | ||
Comment 2•10 years ago
|
||
Carrying r=keeler from bug 1076983 attachment 8501520 [details] [diff] [review].
Approval Request Comment
[Feature/regressing bug #]: 1083058
[User impact if declined]:
I think that this patch should follow bug 1076983 out, though perhaps not as far back as ESR. The risk is that someone uses a pref to enable SSLv3 for specific sites (enterprise cases in particular). That opens those users up to POODLE attacks due to our insecure downgrade. This prevents the insecure downgrade to SSLv3.
Furthermore, if bug 1076983 reveals breakage in sites that we can't tolerate. We can back that out and get the limited protection that this patch offers.
[Describe test coverage new/current, TBPL]:
New unit tests (in patch); tbpl (comment 1); manual testing.
[Risks and why]: Without bug 1076983, this will break site compatibility with sites that only offer a TLS-intolerant SSLv3 stack. This is a strict subset of the sites affected by disabling SSLv3 entirely (bug 1076983).
[String/UUID change made/needed]: None
Note: different patches are required for older releases.
Attachment #8506326 -
Flags: review+
Attachment #8506326 -
Flags: approval-mozilla-aurora?
Assignee | ||
Comment 3•10 years ago
|
||
Rebased to beta.
Approval Request Comment, see comment 2
Attachment #8506521 -
Flags: review+
Attachment #8506521 -
Flags: approval-mozilla-beta?
Comment 5•10 years ago
|
||
Is the plan only to land this on 34 or do you want this in 34+? Also, isn't the primary audience for this change enterprises, who, unless we backport, won't get this change on ESR until June 2015 at the earliest?
status-firefox33:
--- → wontfix
status-firefox34:
--- → affected
status-firefox35:
--- → affected
status-firefox36:
--- → affected
tracking-firefox34:
--- → +
Flags: needinfo?(martin.thomson)
Assignee | ||
Comment 6•10 years ago
|
||
All of which are good questions. Aren't we porting bug 1076983 to ESR 31.3? I think that that would cover that aspect. Basically, I think that this should follow 1076983. ESR primarily for the reasons you note. That means I should probably ask for approval for all the b2g variants too.
Flags: needinfo?(martin.thomson)
Comment 7•10 years ago
|
||
Should this wait to land until bug 1076983 lands?
Note that I would still like to see this land on m-c first and only uplift after the change is verified to be good.
Flags: needinfo?(martin.thomson)
Assignee | ||
Comment 8•10 years ago
|
||
Yes, waiting sounds prudent.
I'll land this on m-c shortly. Let's give it a few days to settle there before it goes anywhere else.
Flags: needinfo?(martin.thomson)
Assignee | ||
Comment 9•10 years ago
|
||
Saw a couple of problems in the first, limited try run. Nothing direct, so I'm giving this more chances to fail. https://treeherder.mozilla.org/ui/#/jobs?repo=try&revision=eef2fcb97048
Assignee | ||
Comment 10•10 years ago
|
||
Comment 11•10 years ago
|
||
Status: NEW → RESOLVED
Closed: 10 years ago
Flags: in-testsuite+
Resolution: --- → FIXED
Target Milestone: --- → mozilla36
Updated•10 years ago
|
Attachment #8506326 -
Flags: approval-mozilla-aurora? → approval-mozilla-aurora+
Updated•10 years ago
|
Attachment #8506521 -
Flags: approval-mozilla-beta? → approval-mozilla-beta+
Comment 12•10 years ago
|
||
Comment 13•10 years ago
|
||
[Tracking Requested - why for this release]: per comment 6
status-firefox-esr31:
--- → affected
tracking-firefox-esr31:
--- → ?
Updated•10 years ago
|
Depends on: 1093724
Updated•10 years ago
|
Status: RESOLVED → VERIFIED
Comment 15•9 years ago
|
||
Could someone who understands this well, update http://kb.mozillazine.org/Security.tls.version.* ?
My understanding is that for most sites the maximum of security.tls.version.{fallback-limit,min} determines the lowest TLS version Firefox is willing to try, but I'm not sure why a separate .min pref is needed -- to control what minimum version is available for "insecure fallback hosts" (security.tls.insecure_fallback_hosts.*, bug 1084025)?
You need to log in
before you can comment on or make changes to this bug.
Description
•