identity ui: Non-PFS should be called as weak encryption (yellow triangle)
Categories
(Firefox :: Security, defect, P3)
Tracking
()
People
(Reporter: jan, Unassigned)
References
(Blocks 3 open bugs)
Details
Reporter | ||
Updated•8 years ago
|
Reporter | ||
Comment 1•8 years ago
|
||
Reporter | ||
Updated•8 years ago
|
Comment 2•7 years ago
|
||
Reporter | ||
Comment 3•7 years ago
|
||
Isn't there an indicator precisely for this now? I've seen it mentioned in the TLS 1.0 deprecation ticket here: https://bugzilla.mozilla.org/show_bug.cgi?id=1227521
Since it exists now, it wouldn't hurt / clutter the UI more when also using it for weak ciphers and eventually lack of PFS, right? So wouldn't that be a great idea to give server vendors a big nudge to improve this while avoiding breaking the sites entirely? (Which full removal of questionable ciphers will do)
Comment 6•6 years ago
|
||
I don't have a strong opinion on that, to be honest, Dana maybe?
Reporter | ||
Comment 7•6 years ago
|
||
TLS 1.0 and TLS 1.1 have already been degraded by bug 1535210. Thank you! :)
This bug asked for degrading everything that is not PFS AEAD, at least initially for Nightly (to DevEdition?) to establish awareness among developers.
https://searchfox.org/mozilla-central/rev/662de518b1686c4769320d6b8825ce4864c4eda0/security/manager/ssl/nsNSSCallbacks.cpp#1274-1275
Would it be possible to extend it to something like this?
#if defined(MOZ_DEV_EDITION) || defined(EARLY_BETA_OR_EARLIER)
bool deprecatedTlsVer;
switch (channelInfo.cipherSuite) {
case TLS_CHACHA20_POLY1305_SHA256:
case TLS_AES_256_GCM_SHA384:
case TLS_AES_128_GCM_SHA256:
case TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256:
case TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
case TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
case TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
case TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
case TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
deprecatedTlsVer = false;
break;
default:
deprecatedTlsVer = true;
break;
}
#else
bool deprecatedTlsVer = (channelInfo.protocolVersion < SSL_LIBRARY_VERSION_TLS_1_2);
#endif
I think it would be more appropriate for something like this to go in the web console or the network security panel (and that way we could actually ship it to release).
Updated•2 years ago
|
Description
•