From: ummeegge <ummeegge@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] OpenSSL_update: Update to version 1.1.1a
Date: Tue, 15 Jan 2019 15:48:06 +0100 [thread overview]
Message-ID: <0e076727bb08db77e71af47fc3244e30a5bf8d63.camel@ipfire.org> (raw)
In-Reply-To: <8cdbaef3-8573-176e-dee3-2c1b52c09edf@link38.eu>
[-- Attachment #1: Type: text/plain, Size: 5085 bytes --]
Hi Peter,
Am Montag, den 14.01.2019, 19:03 +0100 schrieb Peter Müller:
> Hello Erik, hello Michael,
>
> sorry for replying late on this.
>
> > > Hey,
> > >
> > > Okay, I had a look at the differences between your two branches.
> > > There are a few:
> > >
> > > a) Update to openssl 1.1.1a. That’s fine.
> > > b) Loads of rootfile changes. I think that is not because of
> > > Peter
> > > not updating it in his branch. Also fine.
> >
> > It is also 1.1.1a and as far as i can see Peter used 1.1.1 may
> > that´s
> > causes also some changes.
>
> Yes, my branch still uses 1.1.1 and the rootfiles usually do not like
> me, so I am glad Erik took care of these... :-)
May this causes the differences.
> >
> > > c) Erik re-enabled ARIA, SEED and MD2. See below.
> >
> > Will disable then ARIA and MD2.
>
> As far as I am aware, ARIA are some ciphers introduced more or less
> by South Korean entities (KISA), which disqualifies them for security
> purposes.
> MD2 to MD4 trace back to Chinese authorities.
>
> This sounds a bit like racist cryptography - in fact I do not trust
> BSI/NIST either -, but they are very rarely used, and it is better to
> have a small but secure set of ciphers built-in.
>
> Because of this, I suggest to disable ARIA and MDx.
Did that now.
> >
> > > d) The ciphersuites patch from Erik reverts Peter’s changes. I
> > > suspect that Peter disagrees with this :) Please comment.
> >
> > have seen that i used an old cipher patch from Peter and haven´t
> > recognized the update there. Took a fast look over it and it makes
> > more
> > sense with this patch, will adapt it to the actual one then.
>
> @Erik: Are you referring to
>
https://git.ipfire.org/?p=people/pmueller/ipfire-2.x.git;a=commit;h=70d48c264c1fb1987b52d190fecf870d00ceb148
> ?
> If yes, having this patch in OpenSSL would be great. Thank you.
Your welcome. Have acccidentially used another patch, have send now
this one -->
https://lists.ipfire.org/pipermail/development/2019-January/005226.html
can you please check out if this is your mentioned one ?
> >
> > > e) Erik’s branch doesn’t have the changes for Apache that enable
> > > using the TLSv1.3 ciphersuites.
> >
> > Since Peter worked already on this i left this one out.
>
> I will send this patch as a standalone one within the next hours,
> hopefully it will make it into the same Core Update.
> >
> > >
> > > Regarding the ciphers:
> > >
> > > I do not think that we are using MD2 or ARIA anywhere. I guess we
> > > can
> > > agree that we can disable this. They are old and not commonly
> > > used.
> >
> > Please see above, will adapt it to the actual one then.
>
> ACK.
> >
> > >
> > > About SEED: We cannot disable this because OpenVPN uses this. It
> > > is
> > > an option on the dropdown. I do not see any reason for removing
> > > it
> > > there because I am not aware that SEED might potentially be
> > > broken or
> > > dangerous to use. It doesn’t make any sense to use it because it
> > > is
> > > probably not very fast nor is it very commonly used. Are we okay
> > > with
> > > leaving it enabled for now? If not we must remove it from
> > > OpenVPN,
> > > too.
> >
> > Disabling SEED should be announced via IPFire blog or somewhere
> > else in
> > my opinion since, as you mentioned it already, is SEED a part of
> > OpenVPN and to disable it can break existing connections. It is
> > also a
> > 128 bit block cipher.
>
> SEED is certainly not state-of-the-art cryptography anymore. For
> future
> releases (and IPFire 3.x), we should think about disabling it since
> there
> is little to no advantage compared with AES128.
> > But we can think about to drop 3DES in one of the upcoming updates.
> > If
> > we announce it via IPFire blog people out there which uses this are
> > warned and are better prepared. May we can also introduce then also
> > NCP
> > for OpenVPN so possible affected poeple can switch easily via
> > server
> > configuration modification cause there is no need then to adapt
> > also
> > the client.ovpn´s. But as mentioned this might be better in a
> > future
> > release.
>
> Tripe DES is weak, and should be avoided. Of course, there is some
> legacy
> stuff around which does not (reliably) support anything stronger.
> Possibly
> we can remove it some time before SEED-
> >
> > >
> > > Finally, have we spent any thought on dropping support for
> > > OpenSSL
> > > 1.0.2? We need to check and potentially re-ship anything that
> > > might
> > > be linked against it.
> >
> > We spoke already about that this was the reason i dropped it but
> > there
> > is the need to check the openssl-compat depending addons and go for
> > some intenser testings. May a spring clean for the
> > lasting OpenSSL addon patches might also be an idea ?
> >
> > Will wait now a little with the next commit may there comes some
> > more...
>
> Thanks, and best regards,
> Peter Müller
Best,
Erik
next prev parent reply other threads:[~2019-01-15 14:48 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-09 14:21 Erik Kapfer
2019-01-09 16:39 ` Michael Tremer
2019-01-09 16:59 ` ummeegge
2019-01-09 17:18 ` Michael Tremer
2019-01-09 18:33 ` ummeegge
2019-01-14 18:03 ` Peter Müller
2019-01-15 14:48 ` ummeegge [this message]
2019-01-18 15:09 ` Michael Tremer
2019-01-18 16:45 ` ummeegge
2019-01-18 17:06 ` Peter Müller
2019-01-18 17:35 ` ummeegge
2019-01-22 14:19 ` Michael Tremer
2019-02-11 8:52 ` ummeegge
2019-02-13 11:35 ` Michael Tremer
2019-01-13 17:44 ` [PATCH v2] OpenSSL: " Erik Kapfer
2019-01-15 14:43 ` [PATCH v3] openssl: " Erik Kapfer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0e076727bb08db77e71af47fc3244e30a5bf8d63.camel@ipfire.org \
--to=ummeegge@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox