Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 576266 - gentoo.org mail servers allow SSLv2 connections thus enabling DROWN attack
Summary: gentoo.org mail servers allow SSLv2 connections thus enabling DROWN attack
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Infrastructure
Classification: Unclassified
Component: Other (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Infrastructure
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-03-02 16:38 UTC by Hanno Böck
Modified: 2016-03-06 23:47 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Böck gentoo-dev 2016-03-02 16:38:12 UTC
The mx servers responsible for @gentoo.org allow connections with SSLv2. Also there is an HTTPS server allowing SSLv2 on 140.211.166.183. This makes Gentoo vulnerable to the DROWN attack.

The important thing with DROWN is that it even allows attacking unrelated other services as long as they share the certificate and private key.

Please disable SSLv2 everywhere. (And it's probably best to disable SSLv3 as well, although it's not yet as completely broken and dangerous as SSLv2.)

See:
https://test.drownattack.com/?site=gentoo.org
Comment 1 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2016-03-02 17:08:29 UTC
I disabled it on the mail server at least.
Comment 2 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2016-03-03 00:34:56 UTC
Configuration side is resolved now.

Certificates that need rotating:
dev.gentoo.org SMTP / Postfix
dev.gentoo.org IMAP / Dovecot [1]
dev.gentoo.org HTTPS / Apache [non-cfengine box, done now, was missing some other updates]
lists.gentoo.org SMTP / Postfix
finch.gentoo.org SMTP / Postfix [2]


[1] You didn't include the IMAP server in your list, but it was also affected.
[2] Not in your list, but also affected.
[3] non-cfengine box, done now, was missing some other updates
Comment 3 Hanno Böck gentoo-dev 2016-03-03 01:01:58 UTC
There isn't really a need to rotate certificates. The attack only allows decrypting recorded TLS traffic, but it does not allow to compromise certificates.
Comment 4 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2016-03-03 18:58:39 UTC
(In reply to Hanno Boeck from comment #3)
> There isn't really a need to rotate certificates. The attack only allows
> decrypting recorded TLS traffic, but it does not allow to compromise
> certificates.

The SMTP+IMAP certs are also expired ;-), and the dev.g.o HTTPS one needs a reissue for a SHA1 intermediate.
Comment 5 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2016-03-06 23:47:21 UTC
All rekeys completed.