You've probably all heard about this "new" attack several times by now. Just to confirm what's already been stated - this attack only affects HTTP browsers that deliberately break the TLS handshake protocol to allow using older SSL versions. It does not affect LDAP software at all.
Also, since version 2.4.14 (released February 2009), OpenLDAP has supported TLSProtocolMin slapd config and LDAP_TLS_PROTOCOL_MIN client config directives for selecting the minimum version of SSL/TLS to allow. As this feature has been available for over 5 years there is no reason for any OpenLDAP deployments to be using SSLv3 today.
Joe Friedeggs wrote:
Yes.
To secure against POODLE, don't we need to remove the SSLv3?
No. In the standard TLS handshake protocol, if both sides support TLSv1, it's not possible to downgrade to SSLv3. The POODLE attack only exists because web browsers intentionally break the standard TLS handshake protocol.
2014-10-19 15:36 GMT+02:00 Howard Chu hyc@symas.com:
Or more commonly because some equipment (a firewall, most of the time) closes the connection at both ends, and the browser retries the connection with a protocol downgrade. Web browsers don't intentionally break the handshake, they try to adapt to various servers+networks environments to get the resource desired by the end user.
* Erwann Abalea:
They enable server operators to get away with non-compliant behavior. Now they even punish those who actually maintain their web servers by forcing them to implement TLS_FALLBACK_SCSV support. Web browsers are very much too blame for this particular mess.
And even worse, developers now rush in client application changes to send TLS_FALLBACK_SCSV on every handshake, even if they do not perform a browser-style insecure protocol version downgrade. This will make deployment of TLS 1.3 on servers rather difficult.
Joe Friedeggs friedeggs44@hotmail.com schrieb am 19.10.2014 um 15:17 in
Nachricht BLU170-W8303CBEF13F0FA435A5765A5960@phx.gbl:
Related question: If a slapcat of the config database doesn't show a value for TLSCipherSuite, does it mean it is some default value? Any other way to query the setting?
[...]
Regards, Ulrich
Ulrich Windl wrote:
Related question: If a slapcat of the config database doesn't show a value for TLSCipherSuite, does it mean it is some default value?
I'm pretty sure the default depends on the TLS lib used and how it was built for a certain OS.
=> always set TLSCipherSuite explicitly
To find out which protocols/ciphers can be used with a current installation use sslscan.
Ciao, Michael.
Michael Ströder michael@stroeder.com schrieb am 20.10.2014 um 08:47 in
Nachricht 5444B01F.2050701@stroeder.com:
built
for a certain OS.
Does it mean openLDAP has no idea about the default, unless you explicitly set it?
Ulrich Windl wrote:
I think so. But maybe one of the core developers can confirm.
Also note that cipher key-words HIGH, MEDIUM etc. gets mapped to some library specific cipher sets which can change. E.g. OpenSSL project decided to limit the set of ciphers defined with HIGH.
Which is...
=> always set TLSCipherSuite explicitly
..yet another reason to define TLS protocols and ciphers explicitly.
Ciao, Michael.
openldap-technical@openldap.org