From: Jeffrey Walton <noloader@gmail.com>
To: development@lists.ipfire.org
Subject: Re: CA and HTTPS usage on *.ipfire.org
Date: Mon, 29 Jan 2018 09:17:31 -0500 [thread overview]
Message-ID: <CAH8yC8mccaEmk_-kLQ3d8pZ9qw_=798zckjzX3mHd6vgVuOuCA@mail.gmail.com> (raw)
In-Reply-To: <1517228049.2586.42.camel@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 5407 bytes --]
On Mon, Jan 29, 2018 at 7:14 AM, Michael Tremer
<michael.tremer(a)ipfire.org> wrote:
> First regression! That was a long time, but someone found something:
>
> iPXE does TLS1.2, but no PFS. Doesn't seem to be implemented at all.
>
> https://forum.ipfire.org/viewtopic.php?f=5&t=20232&p=113946#p113946
The problem appears to be iPXE's TLS stack. It is rather anemic...
http://ipxe.org/crypto:
The exact list of supported cipher suites is
RSA_WITH_AES_256_CBC_SHA256,
RSA_WITH_AES_128_CBC_SHA256,
RSA_WITH_AES_256_CBC_SHA, and
RSA_WITH_AES_128_CBC_SHA
They are all key transport schemes, rather than key exchange schemes.
The RSA_WITH_* tells us the key agreement scheme.
> I enabled "AES256-SHA256" for the moment to get it working again, but I suppose
> that is not a permanent solution.
My gut intuition is, OP in the thread should run a squid proxy. The
internal proxy allows the RSA transport schemes, and external
interface of the proxy uses modern protocols and cipher suites.
Stepping back a bit to what is good for IPFire, then it depends. If
the information being protected is public information like free
downloads, then there's not much to gain from PFS. The attacker
already knows the contents of the communications.
If the information includes user account names and passwords for
services or a wiki, then PFS may be desired. If the comms were from a
dissident in an oppressive regime, then PFS would probably be a "must
have".
> What do you guys think about allowing non-PFS cipher suites on
> downloads.ipfire.org, boot.ipfire.org and mirror1.ipfire.org?
It looks like downloads.ipfire.org is a tad bit tight, and could
probably be loosened a bit. However, the loosening probably won't
bridge the gap between a modern protocols and cipher suite list and
iPXE.
Here is downloads.ipfire.org cipher suite list. It uses an server
certificate with an RSA key.
$ sslscan --no-failed download.ipfire.org
...
Testing SSL server download.ipfire.org on port 443
...
Supported Server Cipher(s):
Accepted TLS12 256 bits ECDHE-RSA-AES256-GCM-SHA384
Accepted TLS12 256 bits ECDHE-RSA-AES256-SHA384
Accepted TLS12 256 bits AES256-SHA256
Accepted TLS12 128 bits ECDHE-RSA-AES128-GCM-SHA256
Accepted TLS12 128 bits ECDHE-RSA-AES128-SHA256
Preferred Server Cipher(s):
SSLv3 0 bits (NONE)
TLSv1 0 bits (NONE)
TLS11 0 bits (NONE)
TLS12 256 bits ECDHE-RSA-AES256-GCM-SHA384
You might consider something like the following in your
/etc/httpd/conf.d/ssl.conf :
SSLProtocol -all +TLSv1 +TLSv1.1 +TLSv1.2
SSLCipherSuite HIGH:!aNULL:!kRSA:!MD5:!RC4
Header set Strict-Transport-Security "max-age=15552001; includeSubdomains;"
The above is from the cryptopp.com website, which is another free/open
source project. It results in server cipher suites like shown below.
The site protects public downloads and wiki passwords. The risk
assessment tells us we are OK with TLS 1.0 through TLS 1.2 and the
list of cipher suites shown below.
The "!kRSA" is the one that ensures PFS (along with non-static DH
keys). kRSA allows key *transport*, which is the one where clients
encrypt their premaster secret with the server's RSA key and then send
it to the server. There is no contributory behavior from the server,
and all keys are derived from the one premaster secret. A compromise
of the RSA key allows recovery of past conversations.
When kRSA is removed, that leaves key exchange. Key *exchange* is DH
and it uses random contributions from both the client and the server.
A RSA key compromise does not allow recovery of past conversations
because the comms were setup with random parameters. The server's RSA
signing key was still used, but it was used to sign the messages and
establish authenticity.
Jeff
$ sslscan --no-failed www.cryptopp.com
...
Supported Server Cipher(s):
Accepted TLSv1 256 bits ECDHE-RSA-AES256-SHA
Accepted TLSv1 256 bits DHE-RSA-AES256-SHA
Accepted TLSv1 256 bits DHE-RSA-CAMELLIA256-SHA
Accepted TLSv1 128 bits ECDHE-RSA-AES128-SHA
Accepted TLSv1 128 bits DHE-RSA-AES128-SHA
Accepted TLSv1 128 bits DHE-RSA-CAMELLIA128-SHA
Accepted TLS11 256 bits ECDHE-RSA-AES256-SHA
Accepted TLS11 256 bits DHE-RSA-AES256-SHA
Accepted TLS11 256 bits DHE-RSA-CAMELLIA256-SHA
Accepted TLS11 128 bits ECDHE-RSA-AES128-SHA
Accepted TLS11 128 bits DHE-RSA-AES128-SHA
Accepted TLS11 128 bits DHE-RSA-CAMELLIA128-SHA
Accepted TLS12 256 bits ECDHE-RSA-AES256-GCM-SHA384
Accepted TLS12 256 bits ECDHE-RSA-AES256-SHA384
Accepted TLS12 256 bits ECDHE-RSA-AES256-SHA
Accepted TLS12 256 bits DHE-RSA-AES256-GCM-SHA384
Accepted TLS12 256 bits DHE-RSA-AES256-SHA256
Accepted TLS12 256 bits DHE-RSA-AES256-SHA
Accepted TLS12 256 bits DHE-RSA-CAMELLIA256-SHA
Accepted TLS12 128 bits ECDHE-RSA-AES128-GCM-SHA256
Accepted TLS12 128 bits ECDHE-RSA-AES128-SHA256
Accepted TLS12 128 bits ECDHE-RSA-AES128-SHA
Accepted TLS12 128 bits DHE-RSA-AES128-GCM-SHA256
Accepted TLS12 128 bits DHE-RSA-AES128-SHA256
Accepted TLS12 128 bits DHE-RSA-AES128-SHA
Accepted TLS12 128 bits DHE-RSA-CAMELLIA128-SHA
next prev parent reply other threads:[~2018-01-29 14:17 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-09-08 17:58 [PATCH v2] WebUI: print more information on used nameservers Peter Müller
2017-09-09 10:37 ` Matthias Fischer
2017-09-12 4:38 ` Peter Müller
2017-09-12 16:26 ` Matthias Fischer
2017-09-14 20:41 ` Michael Tremer
2017-09-15 15:05 ` Matthias Fischer
2017-09-15 20:26 ` CA and HTTPS usage on *.ipfire.org (was: Re: [PATCH v2] WebUI: print more information on used nameservers) Peter Müller
2017-09-24 22:00 ` Michael Tremer
2017-09-25 15:48 ` Peter Müller
2017-10-25 14:25 ` CA and HTTPS usage on *.ipfire.org Michael Tremer
2017-10-25 20:12 ` Peter Müller
2017-10-26 10:31 ` Michael Tremer
2017-10-26 19:24 ` Peter Müller
2017-10-27 14:44 ` Michael Tremer
2018-01-29 12:14 ` Michael Tremer
2018-01-29 14:17 ` Jeffrey Walton [this message]
2017-09-17 7:39 ` [PATCH v2] WebUI: print more information on used nameservers Matthias Fischer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAH8yC8mccaEmk_-kLQ3d8pZ9qw_=798zckjzX3mHd6vgVuOuCA@mail.gmail.com' \
--to=noloader@gmail.com \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox