[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #18274 [Tor Browser]: 3DES_EDE_CBC cipher is vulnerable in the current TBB configuration!
#18274: 3DES_EDE_CBC cipher is vulnerable in the current TBB configuration!
------------------------------------------------+--------------------------
Reporter: bugzilla | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Tor Browser | Version:
Severity: Major | Resolution:
Keywords: tbb-security, TorBrowserTeam201602 | Actual Points:
Parent ID: | Points:
Sponsor: |
------------------------------------------------+--------------------------
Comment (by cypherpunks):
> Why is this security hole still present?
Any PoC it was used for False Start protocol?
{{{
Clients MUST NOT use the False Start protocol modification in a
handshake unless the cipher suite uses a key exchange method that has
been whitelisted for this use.
}}}
{{{
Implementations may have their own whitelists of key exchange methods
and client certificate types
}}}
[https://mxr.mozilla.org/mozilla-
esr38/source/security/manager/ssl/src/nsNSSCallbacks.cpp#979
CanFalseStartCallback]
{{{
ECDHE is allowed, but DHE (and RSA) are not.
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18274#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs