Delivery-Date: Wed, 15 Oct 2014 10:40:24 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 152A61E01A9;
	Wed, 15 Oct 2014 10:40:23 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 614DF31012;
	Wed, 15 Oct 2014 14:40:17 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id A5A0331024
 for <tor-talk@lists.torproject.org>; Wed, 15 Oct 2014 14:40:13 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id vNXOMPy0EnX1 for <tor-talk@lists.torproject.org>;
 Wed, 15 Oct 2014 14:40:13 +0000 (UTC)
Received: from patternsinthevoid.net (greyarea.patternsinthevoid.net
 [106.187.37.158])
 by eugeni.torproject.org (Postfix) with ESMTP id 4D98C31012
 for <tor-talk@lists.torproject.org>; Wed, 15 Oct 2014 14:40:13 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by patternsinthevoid.net (Postfix) with ESMTP id 2948E2E275
 for <tor-talk@lists.torproject.org>; Wed, 15 Oct 2014 14:40:08 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at patternsinthevoid.net
Received: from patternsinthevoid.net ([127.0.0.1])
 by localhost (greyarea.patternsinthevoid.net [127.0.0.1]) (amavisd-new,
 port 10024)
 with ESMTP id JWApo0mhCn1s for <tor-talk@lists.torproject.org>;
 Wed, 15 Oct 2014 14:39:54 +0000 (UTC)
Date: Wed, 15 Oct 2014 14:37:32 +0000
From: isis <isis@torproject.org>
To: tor-talk@lists.torproject.org
Message-ID: <20141015143732.GA3275@patternsinthevoid.net>
References: <CAKDKvuyutPgxnLJyMeznMM9Uq6ow=aKLg6=1Q6qk8y0yT2mf3Q@mail.gmail.com>
 <20141015072057.GA15352@localhost>
MIME-Version: 1.0
In-Reply-To: <20141015072057.GA15352@localhost>
X-GPG-Public-Key-URL: https://blog.patternsinthevoid.net/isis.txt
X-Louis-Lingg: In this hope do I say to you I despise you. I despise your
 order, your laws, your force-propped authority. Hang me for it!
Subject: Re: [tor-talk] New SSLv3 attack: Turn off SSLv3 in your TorBrowser
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0018016061394407236=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


--===============0018016061394407236==
Content-Type: multipart/signed; micalg=pgp-sha512;
	protocol="application/pgp-signature"; boundary="cNdxnHkX5QqsyA0e"
Content-Disposition: inline


--cNdxnHkX5QqsyA0e
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Matthew Finkel transcribed 2.7K bytes:
> On Tue, Oct 14, 2014 at 10:15:26PM -0400, Nick Mathewson wrote:
> > TorBrowser, on the other hand, does have the same default fallback
> > mechanisms as Firefox.  I expect and hope the TorBrowser team will be
> > releasing a new version soon with SSLv3 enabled.  But in the meantime,
> > I think you can disable SSLv3 yourself by changing the value of the
> > "security.tls.version.min" preference to 1.

I agree that adding `security.tls.version.min =3D 1` is the best fix until a
safe downgrading protocol like TLS_FALLBACK_SCSV is available. Someone
somewhere (I think Mike Perry quoting AGL) mentioned today that we'd only be
breaking 0.3% of the internet if we do this.

> > Obviously, this isn't a convenient way to do this; if you are
> > uncertain of your ability to do so, waiting for an upgrade might be a
> > good move.  In the meantime, if you have serious security requirements
> > and you cannot disable SSLv3, it might be a good idea to avoid using
> > the Internet for a week or two while this all shakes out.

GeKo said they are rebuilding now, so updates should be online within a cou=
ple
hours.

> For what it's worth, the extension[0] should work with the new Tor
> Browser 4.0, but this is untested.

The only thing that Addon does is:

    const gTLSVersionPrefName =3D "security.tls.version.min";
    const gTLSVersionPrefValue =3D 1;

    const { PrefsTarget } =3D require("sdk/preferences/event-target");
    const gPrefService =3D require("sdk/preferences/service");
    const gSimplePrefs =3D require("sdk/simple-prefs");

    let gPrefsTarget =3D PrefsTarget();

    function syncMinimumVersion() {
      var configuredMin =3D gSimplePrefs.prefs[gTLSVersionPrefName];
      gPrefService.set(gTLSVersionPrefName, configuredMin);
    }

which is what Nick's suggestion to manually set `security.tls.version.min =
=3D 1`
does. So, luckily, no one reading this should need to install any crazy
extensions. :)

> (and yes, they spelled it "cypher").

:D

> I'm also curious what Mike, Georg, and the other TB Devs think. It
> looks we need to wait until November when SSL will be disabled in
> mainline Firefox[1].

We could try to fix it ourselves now, since NSS 3.17.1 added
TLS_FALLBACK_SCSV, [0] but this is likely development effort that we could
better place elsewhere since Mozilla is already prioritising the issue.

[0]: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17=
=2E1_release_notes

--=20
 =E2=99=A5=E2=92=B6 isis agora lovecruft
_________________________________________________________
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt

--cNdxnHkX5QqsyA0e
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
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=5Oxs
-----END PGP SIGNATURE-----

--cNdxnHkX5QqsyA0e--

--===============0018016061394407236==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============0018016061394407236==--

