[rfc][icedtea-web] https probing
Jacob Wisor
gitne at gmx.de
Mon Aug 11 16:11:53 UTC 2014
On 08/08/2014 10:37 AM, Jiri Vanek wrote:
> Unluckily this fix patch is not helping obscure servers to do exists. It really
> fixes bugs.
>
> First part of fix is delivered to be able handle SSLv2 handshake, Those servers
> do exists, and have no reason nor need to update or patch or whatever. We are
> wrong by not allowing it right now.
> See System.setProperty("https.protocols", "SSLv3,SSLv2Hello"); in code.
Oh yes they do need fixing. SSLv2 is insecure and has been revoked by the IETF,
period. Nobody should be using it. Even SSL 3.0 is deemed by the IETF as
historic (https://datatracker.ietf.org/doc/rfc6101) although it is largely
identical to TLS 1.0. Nevertheless, nobody should be using it either. Just one
of many reasons is that it does not even support such a common hash algorithm as
SHA1 (which by the way has been deprecated by NIST in favor of SHA256 too).
Everybody should really upgrade to at least TLS 1.0, even though possible
security leaks have been discovered in TLS 1.0 on specific configuration
settings permutations.
DO NOT use SSL anymore and DO NOT promote them in your software. Upgrade to TLS.
> Second "fix" to skip certificate check - yes it is workaround abut servers
> fault. But imho necessary workaround. From time to time nearly each server
> corrupt/*outdate* (read not refresh in time ) theirs certificares . Yes it is
> always flaw of admins, but if I insists on usage of javaws/applet in this period
> before admins fix? Then I'm screwed with itw now. Unluckily in intranet
> environment (all https bugs I had were actually reported form intranet) this is
> really common. As another changeset I will probably add warning for "untrusted
> https forced" or similar.
Really? You really want to /enable/ skipping certificate verification just by
the blink of one switch? Have not we learned anything from the past certificate
fiascos and the most recent one "Fake ID" in Android?
I am not totally against /accepting/ invalid certificates or certificates which
validation does not work out but am against doing it in a dump automated way.
For example, most browsers enable users to /accept/ invalid certificates per
session or per website which is okay. But please note that they only do so after
first warning the user and then the user is forced to deliberately take action
to accept an invalid certificate. This is not the case with this patch.
The only automated approach I would accept is where the *administrator* (root),
not the common user, can setup a system setting for IcedTea-Web (e.g. in
/etc/icedtea-web.properties) with a list of accepted SHA1 or SHA256 (or other
has algorithms) certificate hashes. Any other approach would be grossly
negligent, not to mention idiotic.
> Nevertheless, proprietary javaws/plugin must be doing something similar, because
> they do not have similar https issues. So we *must* handle them (not necessary
> by this patch, but I have not found another way in weeks of investigating).
> Maybe it is messing the concept a bit, but if it is not fixed, then people will
> always say "it is working with proprietary one" and so get rid of itw.
Just because someone else is jumping out the window, it does not oblige us do so
too.
> As for naming suggetstions:
> I would vote for
>
> deployment.security.https.probing.alowed
> deployment.security.https.syncforced";
> deployment.security.https.probing.always";
> deployment.security.https.allowunsecure";
Please, the term "unsecure" does not exist in the English language. Luckily, the
term "insecure" does. ;-)
Have nice day!
Jacob
More information about the distro-pkg-dev
mailing list