View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0002357 | Kali Linux | General Bug | public | 2015-06-24 23:08 | 2015-06-24 23:30 |
| Reporter | jsherwood0 | Assigned To | muts | ||
| Priority | normal | Severity | major | Reproducibility | always |
| Status | closed | Resolution | no change required | ||
| Product Version | 1.1.0 | ||||
| Summary | 0002357: SSLv2 needs to be functional in a pentesting distro | ||||
| Description | The baseline Debian openssl package has been patched to disable SSLv2 due to its inherent insecurity. While this makes perfect sense for a server distro, it is completely inappropriate to have the ability to connect to insecure servers (using SSLv2) disabled on a pentesting distro. Part of what Kali is used for is exploiting vulnerable protocols, so using the mainstream Debian package where SSLv2 is disabled is contrary to the main use case of the distro. Issue 0000146 was closed because a single tool (sslscan) was modified to use static libraries with SSLv2 support enabled. A note was left on that issue that it should be reopened if other apps that needed the libraries were identified. It is important here to recognize that identifying the use of SSLv2 on a server is good, but that identifying high level vulnerabilities aside from that is still required. The problem is that all of the apps that can be used to connect over SSL need to function with SSLv2. For (incomplete) example:
As it stands, we have had to rebuild the openssl package and rebuild curl and ruby against those libraries to support our common needs. Obviously, these are steps that shouldn't be needed with a pentesting distro. | ||||
|
Thanks for the suggestion, however i do not think we will go down this path. People who need this extended functionality can rebuild tools and packages as they see fit. |
|
|
I'm sorry, but all of your userbase needs this functionality. If they are not using it then they are failing to do their job thoroughly. Requiring your users to rebuild packages to get the ability to use all protocol types does not seem like the right solution, since those who want to go that route are using other distros. |
|
|
We will not be enabling SSLv2 system wide. |
|
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2015-06-24 23:08 | jsherwood0 | New Issue | |
| 2015-06-24 23:16 | muts | Note Added: 0003433 | |
| 2015-06-24 23:16 | muts | Status | new => closed |
| 2015-06-24 23:16 | muts | Assigned To | => muts |
| 2015-06-24 23:16 | muts | Resolution | open => no change required |
| 2015-06-24 23:17 | muts | Note Edited: 0003433 | |
| 2015-06-24 23:17 | muts | Note Edited: 0003433 | |
| 2015-06-24 23:24 | jsherwood0 | Note Added: 0003434 | |
| 2015-06-24 23:24 | jsherwood0 | Status | closed => feedback |
| 2015-06-24 23:24 | jsherwood0 | Resolution | no change required => reopened |
| 2015-06-24 23:30 | muts | Note Added: 0003435 | |
| 2015-06-24 23:30 | muts | Status | feedback => closed |
| 2015-06-24 23:30 | muts | Resolution | reopened => no change required |