Freeze Break: SSLv3
Ricky Elrod
codeblock at elrod.me
Wed Oct 15 01:41:56 UTC 2014
+1 here, though additional testing of the koji change can't hurt.
-Ricky
On 10/14/2014 09:32 PM, Kevin Fenzi wrote:
> There's been a vulnerability discovered in SSLv3 that basically allows
> attackers to decrypt it. ;(
>
> I would like to apply the following and disable it on our sites for now
> until and unless we find a better solution in coming days.
>
> Note that I am likely going to try and test the koji change in stg first
> and might adjust it some.
>
> I'll also likely apply this soon anyhow as it's a security issue,
> but more eye's +1's welcome.
>
> kevin
> --
> diff --git a/configs/httpd/websites/infrastructure.fedoraproject.org.conf b/configs/httpd/websites/infrastructur
> index 2d8a8dc..2d197eb 100644
> --- a/configs/httpd/websites/infrastructure.fedoraproject.org.conf
> +++ b/configs/httpd/websites/infrastructure.fedoraproject.org.conf
> @@ -56,7 +56,7 @@
> # https://fedorahosted.org/fedora-infrastructure/ticket/4101#comment:14
> # If you change the protocols or cipher suites, you should probably update
> # modules/squid/files/squid.conf-el6 too, to keep it in sync.
> - SSLProtocol +SSLv3 +TLSv1
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-EC
>
> Include "conf.d/infrastructure.fedoraproject.org/*.conf"
> diff --git a/configs/system/fedorapeople/people.conf b/configs/system/fedorapeople/people.conf
> index 113321b..674f28a 100644
> --- a/configs/system/fedorapeople/people.conf
> +++ b/configs/system/fedorapeople/people.conf
> @@ -36,7 +36,7 @@ NameVirtualHost [2610:28:3090:3001:5054:ff:fedb:7f5a]:443
> SSLCertificateChainFile /etc/pki/tls/certs/wildcard-2014.fedorapeople.org.intermediate.cert
> SSLHonorCipherOrder On
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-EC
> - SSLProtocol +SSLv3 +TLSv1
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
>
> Header add Strict-Transport-Security "max-age=15768000; includeSubDomains; preload"
>
> diff --git a/configs/system/planet/planet.conf b/configs/system/planet/planet.conf
> index 0ee76fc..ed80bcc 100644
> --- a/configs/system/planet/planet.conf
> +++ b/configs/system/planet/planet.conf
> @@ -47,7 +47,7 @@
> SSLCertificateChainFile /etc/pki/tls/certs/wildcard-2014.fedorapeople.org.intermediate.cert
> SSLHonorCipherOrder On
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
> - SSLProtocol +SSLv3 +TLSv1
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
>
> DocumentRoot "/srv/planet/site/"
>
> diff --git a/configs/web/fedorahosted.org.conf b/configs/web/fedorahosted.org.conf
> index f3476c2..b5ac057 100644
> --- a/configs/web/fedorahosted.org.conf
> +++ b/configs/web/fedorahosted.org.conf
> @@ -23,7 +23,7 @@ Listen 443
> SSLCertificateChainFile /etc/httpd/conf.d/fedorahosted.org/wildcard-2014.fedorahosted.org.intermediate.cert
> SSLHonorCipherOrder On
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
> - SSLProtocol +SSLv3 +TLSv1
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
>
> Header add Strict-Transport-Security "max-age=15768000; includeSubDomains; preload"
>
> diff --git a/configs/web/git.fedorahosted.org.conf b/configs/web/git.fedorahosted.org.conf
> index bba8519..f670515 100644
> --- a/configs/web/git.fedorahosted.org.conf
> +++ b/configs/web/git.fedorahosted.org.conf
> @@ -21,7 +21,7 @@ Alias /robots.txt /srv/web/fedorahosted.org/robots.txt
> SSLCertificateChainFile /etc/httpd/conf.d/fedorahosted.org/wildcard-2014.fedorahosted.org.intermediate.cert
> SSLHonorCipherOrder On
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
> - SSLProtocol +SSLv3 +TLSv1
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
>
> Alias /cgit-data /usr/share/cgit
> ScriptAlias /cgit /var/www/cgi-bin/cgit
> diff --git a/configs/web/koji-ssl.conf b/configs/web/koji-ssl.conf
> index 93696c8..307e82d 100644
> --- a/configs/web/koji-ssl.conf
> +++ b/configs/web/koji-ssl.conf
> @@ -97,7 +97,7 @@ SSLEngine on
> # SSL Protocol support:
> # List the enable protocol levels with which clients will be able to
> # connect. Disable SSLv2 access by default:
> -SSLProtocol all -SSLv2
> +SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
>
> # SSL Cipher Suite:
> # List the ciphers that the client is permitted to negotiate.
> diff --git a/configs/web/pkgs.fedoraproject.org/lookaside-upload.conf b/configs/web/pkgs.fedoraproject.org/looka
> index bf41146..bfb44d6 100644
> --- a/configs/web/pkgs.fedoraproject.org/lookaside-upload.conf
> +++ b/configs/web/pkgs.fedoraproject.org/lookaside-upload.conf
> @@ -29,8 +29,7 @@ SSLCryptoDevice builtin
> SSLCARevocationFile /etc/pki/tls/crl.pem
>
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
> - SSLProtocol +SSLv3 +TLSv1
> -
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
>
> # Must be 'optional' everywhere in order to have POST operations work to upload.cgi
> SSLVerifyClient optional
> diff --git a/modules/httpd/templates/website.conf.erb b/modules/httpd/templates/website.conf.erb
> index 668c090..817b5ef 100644
> --- a/modules/httpd/templates/website.conf.erb
> +++ b/modules/httpd/templates/website.conf.erb
> @@ -42,7 +42,7 @@
> # https://fedorahosted.org/fedora-infrastructure/ticket/4101#comment:14
> # If you change the protocols or cipher suites, you should probably update
> # modules/squid/files/squid.conf-el6 too, to keep it in sync.
> - SSLProtocol +SSLv3 +TLSv1
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
> SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-EC
>
> Include "conf.d/<%= name %>/*.conf"
> diff --git a/modules/puppet/files/puppetmaster.conf b/modules/puppet/files/puppetmaster.conf
> index 4294a14..08a6d3b 100644
> --- a/modules/puppet/files/puppetmaster.conf
> +++ b/modules/puppet/files/puppetmaster.conf
> @@ -58,6 +58,7 @@ user apache
> ServerName master.puppetmanaged.org
> SSLEngine on
> SSLCipherSuite SSLv2:-LOW:-EXPORT:RC4+RSA
> + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
> SSLCertificateFile /var/lib/puppet/ssl/certs/puppet.pem
> SSLCertificateKeyFile /var/lib/puppet/ssl/private_keys/puppet.pem
> SSLCertificateChainFile /var/lib/puppet/ssl/ca/ca_crt.pem
> diff --git a/modules/squid/files/squid.conf-el6 b/modules/squid/files/squid.conf-el6
> index 80b8e86..123af78 100644
> --- a/modules/squid/files/squid.conf-el6
> +++ b/modules/squid/files/squid.conf-el6
> @@ -1,5 +1,5 @@
> http_port 80 defaultsite=kojipkgs.fedoraproject.org
> -https_port 443 defaultsite=kojipkgs.fedoraproject.org cert=/etc/pki/tls/certs/wildcard-2014.squid.cert key=/etc
> +https_port 443 defaultsite=kojipkgs.fedoraproject.org cert=/etc/pki/tls/certs/wildcard-2014.squid.cert key=/etc
>
> cache_peer 127.0.0.1 parent 8080 0 no-query originserver name=kojipkgs
> hierarchy_stoplist cgi-bin ?
>
>
>
> _______________________________________________
> infrastructure mailing list
> infrastructure at lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/infrastructure
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.fedoraproject.org/pipermail/infrastructure/attachments/20141014/67e81ab6/attachment.sig>
More information about the infrastructure
mailing list