public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] OpenSSL_update: Update to version 1.1.1a
Date: Fri, 18 Jan 2019 15:09:42 +0000	[thread overview]
Message-ID: <B5BA322C-DBD6-4EAE-BD76-EB5CB968A6B8@ipfire.org> (raw)
In-Reply-To: <0e076727bb08db77e71af47fc3244e30a5bf8d63.camel@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 5361 bytes --]

Hey,

It is merged. It built (on ARM :D). Who wants to give it a try?

  https://nightly.ipfire.org/next/2019-01-17%2019:24:46%20+0000-93d516bd/

-Michael

> On 15 Jan 2019, at 14:48, ummeegge <ummeegge(a)ipfire.org> wrote:
> 
> Hi Peter,
> 
> Am Montag, den 14.01.2019, 19:03 +0100 schrieb Peter Müller:
>> Hello Erik, hello Michael,
>> 
>> sorry for replying late on this.
>> 
>>>> Hey,
>>>> 
>>>> Okay, I had a look at the differences between your two branches.
>>>> There are a few:
>>>> 
>>>> a) Update to openssl 1.1.1a. That’s fine.
>>>> b) Loads of rootfile changes. I think that is not because of
>>>> Peter
>>>> not updating it in his branch. Also fine.
>>> 
>>> It is also 1.1.1a and as far as i can see Peter used 1.1.1 may
>>> that´s
>>> causes also some changes.
>> 
>> Yes, my branch still uses 1.1.1 and the rootfiles usually do not like
>> me, so I am glad Erik took care of these... :-)
> May this causes the differences.
> 
>>> 
>>>> c) Erik re-enabled ARIA, SEED and MD2. See below.
>>> 
>>> Will disable then ARIA and MD2.
>> 
>> As far as I am aware, ARIA are some ciphers introduced more or less
>> by South Korean entities (KISA), which disqualifies them for security
>> purposes.
>> MD2 to MD4 trace back to Chinese authorities.
>> 
>> This sounds a bit like racist cryptography - in fact I do not trust
>> BSI/NIST either -, but they are very rarely used, and it is better to
>> have a small but secure set of ciphers built-in.
>> 
>> Because of this, I suggest to disable ARIA and MDx.
> Did that now.
> 
>>> 
>>>> d) The ciphersuites patch from Erik reverts Peter’s changes. I
>>>> suspect that Peter disagrees with this :) Please comment.
>>> 
>>> have seen that i used an old cipher patch from Peter and haven´t
>>> recognized the update there. Took a fast look over it and it makes
>>> more
>>> sense with this patch, will adapt it to the actual one then.
>> 
>> @Erik: Are you referring to
>> 
> https://git.ipfire.org/?p=people/pmueller/ipfire-2.x.git;a=commit;h=70d48c264c1fb1987b52d190fecf870d00ceb148
>> ?
>> If yes, having this patch in OpenSSL would be great. Thank you.
> Your welcome. Have acccidentially used another patch, have send now
> this one -->
> https://lists.ipfire.org/pipermail/development/2019-January/005226.html
> can you please check out if this is your mentioned one ?
> 
>>> 
>>>> e) Erik’s branch doesn’t have the changes for Apache that enable
>>>> using the TLSv1.3 ciphersuites.
>>> 
>>> Since Peter worked already on this i left this one out.
>> 
>> I will send this patch as a standalone one within the next hours,
>> hopefully it will make it into the same Core Update.
>>> 
>>>> 
>>>> Regarding the ciphers:
>>>> 
>>>> I do not think that we are using MD2 or ARIA anywhere. I guess we
>>>> can
>>>> agree that we can disable this. They are old and not commonly
>>>> used.
>>> 
>>> Please see above, will adapt it to the actual one then.
>> 
>> ACK.
>>> 
>>>> 
>>>> About SEED: We cannot disable this because OpenVPN uses this. It
>>>> is
>>>> an option on the dropdown. I do not see any reason for removing
>>>> it
>>>> there because I am not aware that SEED might potentially be
>>>> broken or
>>>> dangerous to use. It doesn’t make any sense to use it because it
>>>> is
>>>> probably not very fast nor is it very commonly used. Are we okay
>>>> with
>>>> leaving it enabled for now? If not we must remove it from
>>>> OpenVPN,
>>>> too.
>>> 
>>> Disabling SEED should be announced via IPFire blog or somewhere
>>> else in
>>> my opinion since, as you mentioned it already, is SEED a part of
>>> OpenVPN and to disable it can break existing connections. It is
>>> also a
>>> 128 bit block cipher.
>> 
>> SEED is certainly not state-of-the-art cryptography anymore. For
>> future
>> releases (and IPFire 3.x), we should think about disabling it since
>> there
>> is little to no advantage compared with AES128.
>>> But we can think about to drop 3DES in one of the upcoming updates.
>>> If
>>> we announce it via IPFire blog people out there which uses this are
>>> warned and are better prepared. May we can also introduce then also
>>> NCP
>>> for OpenVPN so possible affected poeple can switch easily via
>>> server
>>> configuration modification cause there is no need then to adapt
>>> also
>>> the client.ovpn´s. But as mentioned this might be better in a
>>> future
>>> release.
>> 
>> Tripe DES is weak, and should be avoided. Of course, there is some
>> legacy
>> stuff around which does not (reliably) support anything stronger.
>> Possibly
>> we can remove it some time before SEED-
>>> 
>>>> 
>>>> Finally, have we spent any thought on dropping support for
>>>> OpenSSL
>>>> 1.0.2? We need to check and potentially re-ship anything that
>>>> might
>>>> be linked against it.
>>> 
>>> We spoke already about that this was the reason i dropped it but
>>> there
>>> is the need to check the openssl-compat depending addons and go for
>>> some intenser testings. May a spring clean for the
>>> lasting OpenSSL addon patches might also be an idea ?
>>> 
>>> Will wait now a little with the next commit may there comes some
>>> more...
>> 
>> Thanks, and best regards,
>> Peter Müller
> 
> Best,
> 
> Erik
> 


  reply	other threads:[~2019-01-18 15:09 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-01-09 14:21 Erik Kapfer
2019-01-09 16:39 ` Michael Tremer
2019-01-09 16:59   ` ummeegge
2019-01-09 17:18     ` Michael Tremer
2019-01-09 18:33       ` ummeegge
2019-01-14 18:03         ` Peter Müller
2019-01-15 14:48           ` ummeegge
2019-01-18 15:09             ` Michael Tremer [this message]
2019-01-18 16:45               ` ummeegge
2019-01-18 17:06                 ` Peter Müller
2019-01-18 17:35                   ` ummeegge
2019-01-22 14:19                     ` Michael Tremer
2019-02-11  8:52                   ` ummeegge
2019-02-13 11:35                     ` Michael Tremer
2019-01-13 17:44 ` [PATCH v2] OpenSSL: " Erik Kapfer
2019-01-15 14:43   ` [PATCH v3] openssl: " Erik Kapfer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=B5BA322C-DBD6-4EAE-BD76-EB5CB968A6B8@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox