From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] OpenSSL_update: Update to version 1.1.1a
Date: Fri, 18 Jan 2019 15:09:42 +0000 [thread overview]
Message-ID: <B5BA322C-DBD6-4EAE-BD76-EB5CB968A6B8@ipfire.org> (raw)
In-Reply-To: <0e076727bb08db77e71af47fc3244e30a5bf8d63.camel@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 5361 bytes --]
Hey,
It is merged. It built (on ARM :D). Who wants to give it a try?
https://nightly.ipfire.org/next/2019-01-17%2019:24:46%20+0000-93d516bd/
-Michael
> On 15 Jan 2019, at 14:48, ummeegge <ummeegge(a)ipfire.org> wrote:
>
> Hi Peter,
>
> Am Montag, den 14.01.2019, 19:03 +0100 schrieb Peter Müller:
>> Hello Erik, hello Michael,
>>
>> sorry for replying late on this.
>>
>>>> Hey,
>>>>
>>>> Okay, I had a look at the differences between your two branches.
>>>> There are a few:
>>>>
>>>> a) Update to openssl 1.1.1a. That’s fine.
>>>> b) Loads of rootfile changes. I think that is not because of
>>>> Peter
>>>> not updating it in his branch. Also fine.
>>>
>>> It is also 1.1.1a and as far as i can see Peter used 1.1.1 may
>>> that´s
>>> causes also some changes.
>>
>> Yes, my branch still uses 1.1.1 and the rootfiles usually do not like
>> me, so I am glad Erik took care of these... :-)
> May this causes the differences.
>
>>>
>>>> c) Erik re-enabled ARIA, SEED and MD2. See below.
>>>
>>> Will disable then ARIA and MD2.
>>
>> As far as I am aware, ARIA are some ciphers introduced more or less
>> by South Korean entities (KISA), which disqualifies them for security
>> purposes.
>> MD2 to MD4 trace back to Chinese authorities.
>>
>> This sounds a bit like racist cryptography - in fact I do not trust
>> BSI/NIST either -, but they are very rarely used, and it is better to
>> have a small but secure set of ciphers built-in.
>>
>> Because of this, I suggest to disable ARIA and MDx.
> Did that now.
>
>>>
>>>> d) The ciphersuites patch from Erik reverts Peter’s changes. I
>>>> suspect that Peter disagrees with this :) Please comment.
>>>
>>> have seen that i used an old cipher patch from Peter and haven´t
>>> recognized the update there. Took a fast look over it and it makes
>>> more
>>> sense with this patch, will adapt it to the actual one then.
>>
>> @Erik: Are you referring to
>>
> https://git.ipfire.org/?p=people/pmueller/ipfire-2.x.git;a=commit;h=70d48c264c1fb1987b52d190fecf870d00ceb148
>> ?
>> If yes, having this patch in OpenSSL would be great. Thank you.
> Your welcome. Have acccidentially used another patch, have send now
> this one -->
> https://lists.ipfire.org/pipermail/development/2019-January/005226.html
> can you please check out if this is your mentioned one ?
>
>>>
>>>> e) Erik’s branch doesn’t have the changes for Apache that enable
>>>> using the TLSv1.3 ciphersuites.
>>>
>>> Since Peter worked already on this i left this one out.
>>
>> I will send this patch as a standalone one within the next hours,
>> hopefully it will make it into the same Core Update.
>>>
>>>>
>>>> Regarding the ciphers:
>>>>
>>>> I do not think that we are using MD2 or ARIA anywhere. I guess we
>>>> can
>>>> agree that we can disable this. They are old and not commonly
>>>> used.
>>>
>>> Please see above, will adapt it to the actual one then.
>>
>> ACK.
>>>
>>>>
>>>> About SEED: We cannot disable this because OpenVPN uses this. It
>>>> is
>>>> an option on the dropdown. I do not see any reason for removing
>>>> it
>>>> there because I am not aware that SEED might potentially be
>>>> broken or
>>>> dangerous to use. It doesn’t make any sense to use it because it
>>>> is
>>>> probably not very fast nor is it very commonly used. Are we okay
>>>> with
>>>> leaving it enabled for now? If not we must remove it from
>>>> OpenVPN,
>>>> too.
>>>
>>> Disabling SEED should be announced via IPFire blog or somewhere
>>> else in
>>> my opinion since, as you mentioned it already, is SEED a part of
>>> OpenVPN and to disable it can break existing connections. It is
>>> also a
>>> 128 bit block cipher.
>>
>> SEED is certainly not state-of-the-art cryptography anymore. For
>> future
>> releases (and IPFire 3.x), we should think about disabling it since
>> there
>> is little to no advantage compared with AES128.
>>> But we can think about to drop 3DES in one of the upcoming updates.
>>> If
>>> we announce it via IPFire blog people out there which uses this are
>>> warned and are better prepared. May we can also introduce then also
>>> NCP
>>> for OpenVPN so possible affected poeple can switch easily via
>>> server
>>> configuration modification cause there is no need then to adapt
>>> also
>>> the client.ovpn´s. But as mentioned this might be better in a
>>> future
>>> release.
>>
>> Tripe DES is weak, and should be avoided. Of course, there is some
>> legacy
>> stuff around which does not (reliably) support anything stronger.
>> Possibly
>> we can remove it some time before SEED-
>>>
>>>>
>>>> Finally, have we spent any thought on dropping support for
>>>> OpenSSL
>>>> 1.0.2? We need to check and potentially re-ship anything that
>>>> might
>>>> be linked against it.
>>>
>>> We spoke already about that this was the reason i dropped it but
>>> there
>>> is the need to check the openssl-compat depending addons and go for
>>> some intenser testings. May a spring clean for the
>>> lasting OpenSSL addon patches might also be an idea ?
>>>
>>> Will wait now a little with the next commit may there comes some
>>> more...
>>
>> Thanks, and best regards,
>> Peter Müller
>
> Best,
>
> Erik
>
next prev parent reply other threads:[~2019-01-18 15:09 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-09 14:21 Erik Kapfer
2019-01-09 16:39 ` Michael Tremer
2019-01-09 16:59 ` ummeegge
2019-01-09 17:18 ` Michael Tremer
2019-01-09 18:33 ` ummeegge
2019-01-14 18:03 ` Peter Müller
2019-01-15 14:48 ` ummeegge
2019-01-18 15:09 ` Michael Tremer [this message]
2019-01-18 16:45 ` ummeegge
2019-01-18 17:06 ` Peter Müller
2019-01-18 17:35 ` ummeegge
2019-01-22 14:19 ` Michael Tremer
2019-02-11 8:52 ` ummeegge
2019-02-13 11:35 ` Michael Tremer
2019-01-13 17:44 ` [PATCH v2] OpenSSL: " Erik Kapfer
2019-01-15 14:43 ` [PATCH v3] openssl: " Erik Kapfer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=B5BA322C-DBD6-4EAE-BD76-EB5CB968A6B8@ipfire.org \
--to=michael.tremer@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox