[Bug 1256576] Re: Ubuntu 12.04 LTS: OpenSSL downlevel version is 1.0.0, and does not support TLS 1.2

Marko Kreen markokr at gmail.com
Tue Dec 3 22:31:31 UTC 2013


There are 2 issues with OpenSSL/TLSv1.2 in Ubuntu.  I'm on 12.04, but I
see the same patch in newer Ubuntu versions.

1) TLSv1.2 is removed from SSLv23_method().  It's technically fine
policy decision.  But I think it should be reverted at least new Ubuntu
versions.  All the sites mentioned in +1y old bugs work fine now with
TLSv1.2 requests.  And several high-profile browsers are now using
TLSv1.2 protocol by default (IE11, Chrome, Safari), so any remaining
problematic sites will feel pain if they don't fix.

Eg, see site and browser state here:
https://www.ssllabs.com/ssltest/analyze.html?d=mediafire.com

My suggestion: remove this limitation at least from 14.04.

2) TLSv1.2 ciphersuite list is cut to first 25.  Thanks to 1) this will
affect only apps requesting TLSv1.2 explicitly.  It allows only AES256
ciphersuites, which is not big problem.  But it also disables secure
renegotation, which is signaled with extra ciphersuite.

IOW: apps that want the "newest and most secure TLS version" get
crippled protocol instead connection failure if some middleware box
fails.

My suggestion: please revert this patch from everywhere.  It's dumb idea
to force "max-compat" to apps that explicitly want TLSv1.2.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1256576

Title:
  Ubuntu 12.04 LTS: OpenSSL downlevel version is 1.0.0, and does not
  support TLS 1.2

Status in “openssl” package in Ubuntu:
  New

Bug description:
  The long term support version of Ubuntu 12.04 provides OpenSSL 1.0.0.
  A wireshark trace shows the version of OpenSSL used by Ubuntu does not
  support TLS 1.2. According to the change logs, TLS 1.2 support was
  added 14 March 2012. The change log can be found at
  http://www.openssl.org/news/changelog.html, and the TLS additions can
  be found under the heading "Changes between 1.0.0h and 1.0.1".

  $ ldd /usr/lib/x86_64-linux-gnu/libssl.so
      linux-vdso.so.1 =>  (0x00007fffd9d84000)
      libcrypto.so.1.0.0 => /lib/x86_64-linux-gnu/libcrypto.so.1.0.0
  (0x00007f1e0691e000)
      libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f1e0655e000)
      libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x00007f1e06359000)
      libz.so.1 => /lib/x86_64-linux-gnu/libz.so.1 (0x00007f1e06142000)
      /lib64/ld-linux-x86-64.so.2 (0x00007f1e06f6d000)

  ***********

  OpenSSL 1.0.1 is compatible with 1.0.0. From the OpenSSL FAQ
  (http://www.openssl.org/support/faq.html):

  8. How does the versioning scheme work?

  After the release of OpenSSL 1.0.0 the versioning scheme changed.
  Letter releases (e.g. 1.0.1a) can only contain bug and security fixes
  and no new features. Minor releases change the last number (e.g.
  1.0.2) and can contain new features that retain binary compatibility.
  Changes to the middle number are considered major releases and neither
  source nor binary compatibility is guaranteed.

  **********

  By the way, its nearly impossible to file a bug report through the
  launch pad. The maze that's been created is impossible to navigate,
  and its worse than one of those phone menu systems. I had to look up
  the URL to file at http://www.cryptopp.com/wiki/Talk:Linux. Great job
  to the designers of the system. Its probably the same idiots who
  thought a tablet manager was a great idea on the desktop..

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1256576/+subscriptions



More information about the foundations-bugs mailing list