View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0003190 | Kali Linux | Kali Package Bug | public | 2016-03-25 14:44 | 2016-03-25 20:45 |
| Reporter | rexbelli | Assigned To | rhertzog | ||
| Priority | normal | Severity | tweak | Reproducibility | always |
| Status | closed | Resolution | no change required | ||
| Product Version | 2016.1 | ||||
| Summary | 0003190: SSLv3 not enabled in OpenSSL | ||||
| Description | The OpenSSL 1.0.2g package provided by the Kali repo was built with the CONFARGS flags: no-ssl2 no-ssl3 no-ssl3-method. This disables the ability to connect using SSLv3 in Kali, even for testing purposes. It's possible to undo this by rebuilding the package from source without these flags, but it gets tiring to do this for each new version. | ||||
| Steps To Reproduce | openssl s_client -ssl3 -connection <host>:<port> This should fail, the -ssl3 flag does not exist in the current version. | ||||
|
We had similar reports when SSLv2 support has been dropped. But we don't want to diverge from Debian on this sensitive package... there are some applications that link statically against a libssl configured with SSLv2/SSLv3 precisely to avoid this. |
|
|
On which application is this causing you troubles? (sslscan is the application that is specifically using a static copy of openssl) |
|
|
Other than OpenSSL, no specific application. We use the OpenSSL binary to enumerate what parameters a host allows to build its SSL/TLS connections. There are utilities (like sslscan) that replicate some of the functionality, but none do it all, such as sending/receiving data on a raw SSL/TLS socket. I understand why Debian disabled all versions of SSL, but in the case of Kali, it's necessary to still be able to use older (even unsafe) protocols for testing. |
|
|
SSLv3 is droppen because of the SSL-TLS Poodle Attack Vector. Correct me if im wrong! |
|
|
Definitely, kimocoder! And that completely makes sense for a production web server. My reasoning is that Kali is most often used in testing, where the threat and damage of a POODLE attack is negligible. And if you /are/ in a situation where it's a possible attack vector, then you should disallow SSLv3 on your own. Just for emphasis: "in the case of Kali, it's necessary to still be able to use older (even unsafe) protocols for testing." |
|
|
I disagree. Weakening SSL globally in Kali for the sake of some client tools is not acceptable in my eyes. These kind of modifications are better off made on an individual basis - feel free to recompile the openssl package and make any modifications you need for your specific testing environment. eg: apt-get update dpkg-buildpackage |
|
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2016-03-25 14:44 | rexbelli | New Issue | |
| 2016-03-25 15:40 | rhertzog | Note Added: 0005027 | |
| 2016-03-25 15:43 | rhertzog | Note Added: 0005028 | |
| 2016-03-25 15:43 | rhertzog | Assigned To | => rhertzog |
| 2016-03-25 15:43 | rhertzog | Status | new => feedback |
| 2016-03-25 15:57 | rexbelli | Note Added: 0005029 | |
| 2016-03-25 15:57 | rexbelli | Status | feedback => assigned |
| 2016-03-25 20:12 | kimocoder | Note Added: 0005033 | |
| 2016-03-25 20:21 | rexbelli | Note Added: 0005034 | |
| 2016-03-25 20:23 | rexbelli | Note Edited: 0005034 | |
| 2016-03-25 20:38 | muts | Note Added: 0005035 | |
| 2016-03-25 20:38 | muts | Status | assigned => closed |
| 2016-03-25 20:38 | muts | Resolution | open => no change required |
| 2016-03-25 20:41 | muts | Note Edited: 0005035 | |
| 2016-03-25 20:45 | muts | Note Edited: 0005035 |