Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 628144 - Consider adding -sslv2 -sslv3 to the hardened profile
Summary: Consider adding -sslv2 -sslv3 to the hardened profile
Status: CONFIRMED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Hardened (show other bugs)
Hardware: All Linux
: Normal normal with 1 vote (vote)
Assignee: The Gentoo Linux Hardened Team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks: future-profile
  Show dependency tree
 
Reported: 2017-08-17 23:28 UTC by Francisco Blas Izquierdo Riera
Modified: 2022-06-12 15:13 UTC (History)
6 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Francisco Blas Izquierdo Riera (RETIRED) gentoo-dev 2017-08-17 23:28:17 UTC
As it stands, all ciphers supported by SSLv3 are vulnerable:
* The RC4 ciphers are vulnerable to statistical analysis (bar mitzvah attack)
* The FORTEZZA, RC2, IDEA and DES ciphers are vulnerable to collisions for having too small block size (SWEET32 attack).
* The FORTEZZA, RC2, IDEA and DES and AES ciphers are only supported in CBC mode which is vulnerable to the POODLE (and BEAST) attacks using padding oracles.
* The propossed RFC 7568 elaborates more on these issues https://tools.ietf.org/html/rfc7568

SSLV2 is not better than this with issues like DROWN present.

Because of this I'd like to recommend that we provide a safe default in our profiles and disable these USE flags. Users can enable them manually if they need them for some reason.

(Thanks to txt-file for pointing this out in IRC)
Comment 1 Michael Orlitzky gentoo-dev 2017-08-18 12:06:07 UTC
If some package is enabling sslv2 or sslv3  (whose flaws are well-known by now) by default, then wouldn't it make more sense to ask those maintainers to stop? That is, to change "+sslv2" to simply "sslv2". Any package that requires either one should probably have a security bug at this point.
Comment 2 Ulenrich 2017-08-18 12:47:42 UTC
Hasn't libressl-2.6.0 disabled ssl-3 already?
There is a bug of libressl about stabilisation!
Comment 3 Francisco Blas Izquierdo Riera (RETIRED) gentoo-dev 2017-08-18 15:31:58 UTC
(In reply to Michael Orlitzky from comment #1)
> If some package is enabling sslv2 or sslv3  (whose flaws are well-known by
> now) by default, then wouldn't it make more sense to ask those maintainers
> to stop? That is, to change "+sslv2" to simply "sslv2". Any package that
> requires either one should probably have a security bug at this point.

sslv2 isn't enabled by any packages on the portage tree but sslv3 is (which is what prompted this to start with). The foollowing packages have +sslv3 in their IUSE:
=dev-libs/openssl-1.0.2k
=dev-libs/openssl-1.0.2l
=net-libs/gnutls-3.5.12
=net-libs/gnutls-3.5.13
=net-libs/gnutls-3.5.14

And there might be also some overlays doing the same as SSL3 is usually enabled to ensure backwards compatibility with ancient systems.
Comment 4 Francisco Blas Izquierdo Riera (RETIRED) gentoo-dev 2017-08-20 18:56:16 UTC
Keep in mind that the stable openssl versions are also affected by this.
Comment 5 Michael Orlitzky gentoo-dev 2022-06-10 19:43:12 UTC
OpenSSL has phased out these flags, and they're disabled by default in the current stable releases.

GnuTLS has also disabled them by default, but the flags remain in newer versions.

I'm not sure there's anything left to do though since you have to go out of your way to enable them. Five years later, it might be appropriate to throw them in the top-level package.use.mask for good measure. Disabling things that have been known to be exploitable for over a decade isn't exactly "hardening." This would benefit naive users who are afraid to disable anything that says "ssl."