There's been a vulnerability discovered in SSLv3 that basically allows attackers to decrypt it. ;( I would like to apply the following and disable it on our sites for now until and unless we find a better solution in coming days. Note that I am likely going to try and test the koji change in stg first and might adjust it some. I'll also likely apply this soon anyhow as it's a security issue, but more eye's +1's welcome. kevin -- diff --git a/configs/httpd/websites/infrastructure.fedoraproject.org.conf b/configs/httpd/websites/infrastructur index 2d8a8dc..2d197eb 100644 --- a/configs/httpd/websites/infrastructure.fedoraproject.org.conf +++ b/configs/httpd/websites/infrastructure.fedoraproject.org.conf @@ -56,7 +56,7 @@ # https://fedorahosted.org/fedora-infrastructure/ticket/4101#comment:14 # If you change the protocols or cipher suites, you should probably update # modules/squid/files/squid.conf-el6 too, to keep it in sync. - SSLProtocol +SSLv3 +TLSv1 + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-EC Include "conf.d/infrastructure.fedoraproject.org/*.conf" diff --git a/configs/system/fedorapeople/people.conf b/configs/system/fedorapeople/people.conf index 113321b..674f28a 100644 --- a/configs/system/fedorapeople/people.conf +++ b/configs/system/fedorapeople/people.conf @@ -36,7 +36,7 @@ NameVirtualHost [2610:28:3090:3001:5054:ff:fedb:7f5a]:443 SSLCertificateChainFile /etc/pki/tls/certs/wildcard-2014.fedorapeople.org.intermediate.cert SSLHonorCipherOrder On SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-EC - SSLProtocol +SSLv3 +TLSv1 + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 Header add Strict-Transport-Security "max-age=15768000; includeSubDomains; preload" diff --git a/configs/system/planet/planet.conf b/configs/system/planet/planet.conf index 0ee76fc..ed80bcc 100644 --- a/configs/system/planet/planet.conf +++ b/configs/system/planet/planet.conf @@ -47,7 +47,7 @@ SSLCertificateChainFile /etc/pki/tls/certs/wildcard-2014.fedorapeople.org.intermediate.cert SSLHonorCipherOrder On SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE- - SSLProtocol +SSLv3 +TLSv1 + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 DocumentRoot "/srv/planet/site/" diff --git a/configs/web/fedorahosted.org.conf b/configs/web/fedorahosted.org.conf index f3476c2..b5ac057 100644 --- a/configs/web/fedorahosted.org.conf +++ b/configs/web/fedorahosted.org.conf @@ -23,7 +23,7 @@ Listen 443 SSLCertificateChainFile /etc/httpd/conf.d/fedorahosted.org/wildcard-2014.fedorahosted.org.intermediate.cert SSLHonorCipherOrder On SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE- - SSLProtocol +SSLv3 +TLSv1 + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 Header add Strict-Transport-Security "max-age=15768000; includeSubDomains; preload" diff --git a/configs/web/git.fedorahosted.org.conf b/configs/web/git.fedorahosted.org.conf index bba8519..f670515 100644 --- a/configs/web/git.fedorahosted.org.conf +++ b/configs/web/git.fedorahosted.org.conf @@ -21,7 +21,7 @@ Alias /robots.txt /srv/web/fedorahosted.org/robots.txt SSLCertificateChainFile /etc/httpd/conf.d/fedorahosted.org/wildcard-2014.fedorahosted.org.intermediate.cert SSLHonorCipherOrder On SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE- - SSLProtocol +SSLv3 +TLSv1 + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 Alias /cgit-data /usr/share/cgit ScriptAlias /cgit /var/www/cgi-bin/cgit diff --git a/configs/web/koji-ssl.conf b/configs/web/koji-ssl.conf index 93696c8..307e82d 100644 --- a/configs/web/koji-ssl.conf +++ b/configs/web/koji-ssl.conf @@ -97,7 +97,7 @@ SSLEngine on # SSL Protocol support: # List the enable protocol levels with which clients will be able to # connect. Disable SSLv2 access by default: -SSLProtocol all -SSLv2 +SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. diff --git a/configs/web/pkgs.fedoraproject.org/lookaside-upload.conf b/configs/web/pkgs.fedoraproject.org/looka index bf41146..bfb44d6 100644 --- a/configs/web/pkgs.fedoraproject.org/lookaside-upload.conf +++ b/configs/web/pkgs.fedoraproject.org/lookaside-upload.conf @@ -29,8 +29,7 @@ SSLCryptoDevice builtin SSLCARevocationFile /etc/pki/tls/crl.pem SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE- - SSLProtocol +SSLv3 +TLSv1 - + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 # Must be 'optional' everywhere in order to have POST operations work to upload.cgi SSLVerifyClient optional diff --git a/modules/httpd/templates/website.conf.erb b/modules/httpd/templates/website.conf.erb index 668c090..817b5ef 100644 --- a/modules/httpd/templates/website.conf.erb +++ b/modules/httpd/templates/website.conf.erb @@ -42,7 +42,7 @@ # https://fedorahosted.org/fedora-infrastructure/ticket/4101#comment:14 # If you change the protocols or cipher suites, you should probably update # modules/squid/files/squid.conf-el6 too, to keep it in sync. - SSLProtocol +SSLv3 +TLSv1 + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-EC Include "conf.d/<%= name %>/*.conf" diff --git a/modules/puppet/files/puppetmaster.conf b/modules/puppet/files/puppetmaster.conf index 4294a14..08a6d3b 100644 --- a/modules/puppet/files/puppetmaster.conf +++ b/modules/puppet/files/puppetmaster.conf @@ -58,6 +58,7 @@ user apache ServerName master.puppetmanaged.org SSLEngine on SSLCipherSuite SSLv2:-LOW:-EXPORT:RC4+RSA + SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2 SSLCertificateFile /var/lib/puppet/ssl/certs/puppet.pem SSLCertificateKeyFile /var/lib/puppet/ssl/private_keys/puppet.pem SSLCertificateChainFile /var/lib/puppet/ssl/ca/ca_crt.pem diff --git a/modules/squid/files/squid.conf-el6 b/modules/squid/files/squid.conf-el6 index 80b8e86..123af78 100644 --- a/modules/squid/files/squid.conf-el6 +++ b/modules/squid/files/squid.conf-el6 @@ -1,5 +1,5 @@ http_port 80 defaultsite=kojipkgs.fedoraproject.org -https_port 443 defaultsite=kojipkgs.fedoraproject.org cert=/etc/pki/tls/certs/wildcard-2014.squid.cert key=/etc +https_port 443 defaultsite=kojipkgs.fedoraproject.org cert=/etc/pki/tls/certs/wildcard-2014.squid.cert key=/etc cache_peer 127.0.0.1 parent 8080 0 no-query originserver name=kojipkgs hierarchy_stoplist cgi-bin ?
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ infrastructure mailing list infrastructure@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/infrastructure