View Issue Details

IDProjectCategoryView StatusLast Update
0003190Kali LinuxKali Package Bugpublic2016-03-25 20:45
Reporterrexbelli Assigned Torhertzog  
PrioritynormalSeveritytweakReproducibilityalways
Status closedResolutionno change required 
Product Version2016.1 
Summary0003190: SSLv3 not enabled in OpenSSL
Description

The OpenSSL 1.0.2g package provided by the Kali repo was built with the CONFARGS flags: no-ssl2 no-ssl3 no-ssl3-method. This disables the ability to connect using SSLv3 in Kali, even for testing purposes.

It's possible to undo this by rebuilding the package from source without these flags, but it gets tiring to do this for each new version.

Steps To Reproduce

openssl s_client -ssl3 -connection <host>:<port>

This should fail, the -ssl3 flag does not exist in the current version.

Activities

rhertzog

rhertzog

2016-03-25 15:40

administrator   ~0005027

We had similar reports when SSLv2 support has been dropped. But we don't want to diverge from Debian on this sensitive package... there are some applications that link statically against a libssl configured with SSLv2/SSLv3 precisely to avoid this.

rhertzog

rhertzog

2016-03-25 15:43

administrator   ~0005028

On which application is this causing you troubles?

(sslscan is the application that is specifically using a static copy of openssl)

rexbelli

rexbelli

2016-03-25 15:57

reporter   ~0005029

Other than OpenSSL, no specific application. We use the OpenSSL binary to enumerate what parameters a host allows to build its SSL/TLS connections.

There are utilities (like sslscan) that replicate some of the functionality, but none do it all, such as sending/receiving data on a raw SSL/TLS socket.

I understand why Debian disabled all versions of SSL, but in the case of Kali, it's necessary to still be able to use older (even unsafe) protocols for testing.

kimocoder

kimocoder

2016-03-25 20:12

reporter   ~0005033

SSLv3 is droppen because of the SSL-TLS Poodle Attack Vector. Correct me if im wrong!

rexbelli

rexbelli

2016-03-25 20:21

reporter   ~0005034

Last edited: 2016-03-25 20:23

Definitely, kimocoder! And that completely makes sense for a production web server. My reasoning is that Kali is most often used in testing, where the threat and damage of a POODLE attack is negligible. And if you /are/ in a situation where it's a possible attack vector, then you should disallow SSLv3 on your own. Just for emphasis: "in the case of Kali, it's necessary to still be able to use older (even unsafe) protocols for testing."

muts

muts

2016-03-25 20:38

reporter   ~0005035

Last edited: 2016-03-25 20:45

I disagree. Weakening SSL globally in Kali for the sake of some client tools is not acceptable in my eyes. These kind of modifications are better off made on an individual basis - feel free to recompile the openssl package and make any modifications you need for your specific testing environment. eg:

apt-get update
apt-get build-dep openssl
apt-get source openssl
cd openssl-1.0.2g
... edit debian/rules, remove no-ssl2 nossl3 no-ssl3-method from CONFARGS on line 29 ...

dpkg-buildpackage
cd ..
dpkg -i openssl_1.0.2g-1_amd64.deb
dpkg -i libssl1.0.2_1.0.2g-1_amd64.deb

Issue History

Date Modified Username Field Change
2016-03-25 14:44 rexbelli New Issue
2016-03-25 15:40 rhertzog Note Added: 0005027
2016-03-25 15:43 rhertzog Note Added: 0005028
2016-03-25 15:43 rhertzog Assigned To => rhertzog
2016-03-25 15:43 rhertzog Status new => feedback
2016-03-25 15:57 rexbelli Note Added: 0005029
2016-03-25 15:57 rexbelli Status feedback => assigned
2016-03-25 20:12 kimocoder Note Added: 0005033
2016-03-25 20:21 rexbelli Note Added: 0005034
2016-03-25 20:23 rexbelli Note Edited: 0005034
2016-03-25 20:38 muts Note Added: 0005035
2016-03-25 20:38 muts Status assigned => closed
2016-03-25 20:38 muts Resolution open => no change required
2016-03-25 20:41 muts Note Edited: 0005035
2016-03-25 20:45 muts Note Edited: 0005035