[Ach] Issue with OpenSSL >0.9.8l <1.0.0
Aaron Zauner
azet at azet.org
Fri Apr 25 20:01:52 CEST 2014
On 04/25/2014 06:29 PM, Torsten Gigler wrote:
> Aaron,
>
> Preference is also screwed:
> No idea, Is this already supported in 0.9.7a? You need at least ssl3
> for any preference.
It should be, yes.
>
> Kind regards
> Torsten
>
> PS: The second string should be (the 2nd openssl deleted):
> openssl ciphers -v
> DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA128-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-SHA:CAMELLIA128-SHA
Hm. theres still our preference missing (+) and all of the blacklisted
ciphers (!).
Aaron
>
> 2014-04-25 17:49 GMT+02:00 Torsten Gigler <torsten.gigler at owasp.org
> <mailto:torsten.gigler at owasp.org>>:
>
> Hi Aaron,
>
> yes, I see, that was not intended, sorry. I do not have such old
> versions of openssl to check it...
> Are there any servers publically avilable where this could be checked?
>
> What happens if you restore the Deny-Rules and Add !ADH?
>
> openssl ciphers -v
> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:!ADH
>
>
> Does this work?
>
> If not, you could make a list of all supported ciphers (if this
> does not get too long...)
> openssl ciphers -v openssl
> DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA128-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-SHA:CAMELLIA128-SHA
>
> For 0.9.8 this could get something like this:
> DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256)
> Mac=SHA1
> ECDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256)
> Mac=SHA1
> ECDHE-RSA-AES128-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(128)
> Mac=SHA1
> AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256)
> Mac=SHA1
> AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128)
> Mac=SHA1
>
> Performance:
> Yes, DHE needs much more CPU load than ECDHE (I read about 3
> times), but it is more secure...
>
> Kind regards
> Torsten
>
> 2014-04-25 16:58 GMT+02:00 Aaron Zauner <azet at azet.org
> <mailto:azet at azet.org>>:
>
> Hi Torsten,
>
> I've checked with various oder versions of OpenSSL. As you
> have removed the trailing part of our Ciphersuite spec, export
> and crap ciphers would now be possible:
>
> ```
> azet at orpheus ~/openssl/openssl-0.9.7a/apps % ./openssl ciphers
> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA
> -v
> DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256)
> Mac=SHA1
> AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256)
> Mac=SHA1
> DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128)
> Mac=SHA1
> AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128)
> Mac=SHA1
> ADH-AES256-SHA SSLv3 Kx=DH Au=None Enc=AES(256)
> Mac=SHA1
> DHE-DSS-AES256-SHA SSLv3 Kx=DH Au=DSS Enc=AES(256)
> Mac=SHA1
> ADH-AES128-SHA SSLv3 Kx=DH Au=None Enc=AES(128)
> Mac=SHA1
> DHE-DSS-AES128-SHA SSLv3 Kx=DH Au=DSS Enc=AES(128)
> Mac=SHA1
> DHE-DSS-RC4-SHA SSLv3 Kx=DH Au=DSS Enc=RC4(128)
> Mac=SHA1
> EXP1024-DHE-DSS-RC4-SHA SSLv3 Kx=DH(1024) Au=DSS Enc=RC4(56)
> Mac=SHA1 export
> EXP1024-RC4-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=RC4(56)
> Mac=SHA1 export
> EXP1024-DHE-DSS-DES-CBC-SHA SSLv3 Kx=DH(1024) Au=DSS
> Enc=DES(56) Mac=SHA1 export
> EXP1024-DES-CBC-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=DES(56)
> Mac=SHA1 export
> EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA
> Enc=3DES(168) Mac=SHA1
> EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH Au=RSA Enc=DES(56)
> Mac=SHA1
> EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40)
> Mac=SHA1 export
> EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS
> Enc=3DES(168) Mac=SHA1
> EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH Au=DSS Enc=DES(56)
> Mac=SHA1
> EXP-EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH(512) Au=DSS Enc=DES(40)
> Mac=SHA1 export
> DES-CBC3-SHA SSLv3 Kx=RSA Au=RSA
> Enc=3DES(168) Mac=SHA1
> DES-CBC-SHA SSLv3 Kx=RSA Au=RSA Enc=DES(56)
> Mac=SHA1
> EXP-DES-CBC-SHA SSLv3 Kx=RSA(512) Au=RSA Enc=DES(40)
> Mac=SHA1 export
> IDEA-CBC-SHA SSLv3 Kx=RSA Au=RSA
> Enc=IDEA(128) Mac=SHA1
> RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128)
> Mac=SHA1
> ADH-DES-CBC3-SHA SSLv3 Kx=DH Au=None
> Enc=3DES(168) Mac=SHA1
> ADH-DES-CBC-SHA SSLv3 Kx=DH Au=None Enc=DES(56)
> Mac=SHA1
> EXP-ADH-DES-CBC-SHA SSLv3 Kx=DH(512) Au=None Enc=DES(40)
> Mac=SHA1 export
> NULL-SHA SSLv3 Kx=RSA Au=RSA Enc=None
> Mac=SHA1
> azet at orpheus ~/openssl/openssl-0.9.7a/apps % ./openssl version
> OpenSSL 0.9.7a Feb 19 2003
> ```
> Preference is also screwed.
>
> We're entirely missing this part here:
> "+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:"
> (Why is there +SSLv3 in there, btw?)
>
> Aaron
>
>
> On Fri, Apr 25, 2014 at 3:47 PM, Torsten Gigler
> <torsten.gigler at owasp.org <mailto:torsten.gigler at owasp.org>>
> wrote:
>
> Hi,
>
> Have you tried to add ':DHE-RSA-AES256-SHA' in the Cipher
> String?
> Here my suggestion:
>
> openssl ciphers -V
> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA
> 0x00,0x9F - DHE-RSA-AES256-GCM-SHA384 TLSv1.2
> Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
> 0x00,0x9E - DHE-RSA-AES128-GCM-SHA256 TLSv1.2
> Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
> 0x00,0x6B - DHE-RSA-AES256-SHA256 TLSv1.2
> Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
> 0x00,0x39 - DHE-RSA-AES256-SHA SSLv3
> Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
> 0x00,0x88 - DHE-RSA-CAMELLIA256-SHA SSLv3
> Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
> 0x00,0x67 - DHE-RSA-AES128-SHA256 TLSv1.2
> Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
> 0x00,0x45 - DHE-RSA-CAMELLIA128-SHA SSLv3
> Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
> 0xC0,0x30 - ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2
> Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
> 0xC0,0x2F - ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2
> Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
> 0xC0,0x28 - ECDHE-RSA-AES256-SHA384 TLSv1.2
> Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
> 0xC0,0x14 - ECDHE-RSA-AES256-SHA SSLv3
> Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
> 0xC0,0x27 - ECDHE-RSA-AES128-SHA256 TLSv1.2
> Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
> 0xC0,0x13 - ECDHE-RSA-AES128-SHA SSLv3
> Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
> 0x00,0x9D - AES256-GCM-SHA384 TLSv1.2
> Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
> 0x00,0x9C - AES128-GCM-SHA256 TLSv1.2
> Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
> 0x00,0x35 - AES256-SHA SSLv3
> Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
> 0x00,0x84 - CAMELLIA256-SHA SSLv3
> Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
> 0x00,0x2F - AES128-SHA SSLv3
> Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
> 0x00,0x41 - CAMELLIA128-SHA SSLv3
> Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
>
> Remarks:
> - I changed the order of the ciphers (= Priority of the
> ciphers a server chooses, if 'Server Order' is set),
> - excluded '0x00,0x33 - DHE-RSA-AES128-SHA' to protect
> aginst a possible incompatibility for JAVA6+7 & DH-Keys
> >1024bits
> - added '0x00,0x9D - AES256-GCM-SHA384' and '0x00,0x9C -
> AES128-GCM-SHA256' (is there any reason why they weren't
> included before?)
>
> Do you get the following Ciphers with OpenSSL 0.9.8?
> openssl ciphers -v
> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA
> DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA
> Enc=AES(256) Mac=SHA1
> AES256-SHA SSLv3 Kx=RSA Au=RSA
> Enc=AES(256) Mac=SHA1
> AES128-SHA SSLv3 Kx=RSA Au=RSA
> Enc=AES(128) Mac=SHA1
>
> Kind regards
> Torsten
>
> 2014-04-25 11:15 GMT+02:00 Pepi Zawodsky
> <pepi.zawodsky at maclemon.at
> <mailto:pepi.zawodsky at maclemon.at>>:
>
>
> On 25.04.2014, at 04:53, Aaron Zauner <azet at azet.org
> <mailto:azet at azet.org>> wrote:
> > as well as older versions of Mac OS X.
>
> ALL versions of OS X up to and including the current
> Mavericks are affected by this.
> $ /usr/bin/openssl version
> OpenSSL 0.9.8y 5 Feb 2013
>
> Expanding Ciphersuite B results in:
>
> $ /usr/bin/openssl ciphers
> 'EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA'
>
> AES256-SHA:AES128-SHA
>
> Unexpectedly, DHE ciphers are missing.
>
>
> $ /opt/local/bin/openssl version
> OpenSSL 1.0.1g 7 Apr 2014
>
> $ /opt/local/bin/openssl ciphers
> 'EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA'
>
> DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-AES128-SHA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA
>
> Best regards
> Pepi
>
> _______________________________________________
> Ach mailing list
> Ach at lists.cert.at <mailto:Ach at lists.cert.at>
> http://lists.cert.at/cgi-bin/mailman/listinfo/ach
>
>
>
> _______________________________________________
> Ach mailing list
> Ach at lists.cert.at <mailto:Ach at lists.cert.at>
> http://lists.cert.at/cgi-bin/mailman/listinfo/ach
>
>
>
>
More information about the Ach
mailing list