Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tls: make server not use DHE in less than 1024 bits #49

Closed
jasnell opened this issue Oct 21, 2015 · 11 comments
Closed

tls: make server not use DHE in less than 1024 bits #49

jasnell opened this issue Oct 21, 2015 · 11 comments

Comments

@jasnell
Copy link
Member

jasnell commented Oct 21, 2015

@nodejs/lts ... See: tls: make server not use DHE in less than 1024bits ... from what I understand, this would technically be a semver-major.

@shigeki @mhdawson ... which versions are affected by this? is it only v0.12.x? or v4.2.x also?

@shigeki
Copy link

shigeki commented Oct 21, 2015

nodejs/node#1831 was only applied to 5.0 so that this affects all (4.2.x, 0.12, 0.10).

@shigeki
Copy link

shigeki commented Oct 21, 2015

Correction. nodejs/node#1831 was client side:

Server side is affected in 0.12 and 0.10 [EDIT: tls server of v0.10 does not support DHE]
Client side is affected in 4.2.x, 0.12 and 010.

I think we have two options for LTS. Any idea?

  • Limit DH key size with code but disabled by default and introduce a new command line option.
  • Leave it.

@rvagg
Copy link
Member

rvagg commented Oct 22, 2015

Another option is to force it through as semver-minor or semver-patch, we did say that we may use that as an option.

In this case I think I'm in favour of just leaving it as is. In the majority of situations we should end up with secure enough defaults when negotiating with the majority of the clients that are in use right now (I think that's correct anyway).

@mhdawson
Copy link
Member

@shigeki I think the earlier discussion was that it does not apply to 0.10.X because it did not support DHE so it would only be 0.12.X and 4.X. Did I misunderstand ?

As one data point the IBM security teams believe we must make it secure by default which includes this change on the server side. To make is secure by default it would need to be on by default but with an option to turn it off.

@shigeki
Copy link

shigeki commented Oct 27, 2015

@mhdawson I mistook that a TLS server of 0.10 is affected but the tls client of 0.10 can support DHE as below. I fixed the list above. Thanks.

$ ./node ~/tls_client.js
process.version: v0.10.38
clearText.getCipher(): { name: 'DHE-RSA-AES128-SHA256', version: 'TLSv1/SSLv3' }

As one data point the IBM security teams believe we must make it secure by default which includes this change on the server side.

That's glad to me if we can make security hardening to change default behaviors even in LTS and we must notify users that a new option will be deprecated 5.x.

@mhdawson
Copy link
Member

I think the client side was covered by updating the openssl version which we did for 0.10.X and 0.12.X, I don't think we need to do anything else for this on the client side.

So I think for LTS we only need to address the server side. The change is already in 4.X and 0.10.X is not affected so that just leaves 0.12.X. I'll put together a PR to backport to 0.12.X with a command line option to revert

@mhdawson
Copy link
Member

From this https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ the change on the client side in openssl was to disallow DH parameters smaller than 768 so I believe its appropriate to have the same limit on the server side for the 0.12.X release as opposed to 1024 used in later releases. (1024 is fine for later releases but for 0.12.X we need to limit the potential impact to users. Given we match the same limit, and current clients don't accept anything smaller than 768 then unless all of the clients accessing an application are old, a key of 768 on the server side should already have been found/fixed)

@mhdawson
Copy link
Member

Created a PR to cover this for 0.12.X nodejs/node#3890

@mhdawson
Copy link
Member

@jasnell @shigeki can you both chime in on whether we can get this into an upcoming 0.12.X LTS release.

@ChALkeR
Copy link
Member

ChALkeR commented Nov 18, 2015

from what I understand, this would technically be a semver-major.

It prevents a security misconfiguration and that is the only thing that it breaks. That should be enough reasons for making it not a semver-major.

@misterdjules misterdjules changed the title tls: make server not use DHE in less than 1014 bits tls: make server not use DHE in less than 1024 bits Nov 20, 2015
mhdawson added a commit to nodejs/node that referenced this issue Nov 23, 2015
As part of the fix for logjam, node was upgraded to a
level of openssl which rejects connections to servers that
are using keys smaller than 768 bits. It is still possible,
however, to create a server that uses a smaller key size
and and older client may be able to connect to it.

This PR moves us to a secure by default stance on the
server side as well, preventing the creation of a server
using a dhe key size less than 768. This can be overridden
with the command line option which is also added.

It is derived from

9b35be5

which was landed in later io.js/node versions but makes
the limit 1024.  This PR uses the smaller limit in order
to meet the recomendations for logjam while matching was
was done on the client side in openssl to minimize the
potential impacton users.

The command line option will only be documented in the
release notes and will not be added to the tls
documentation.  The goal is that people who are
upgrading are aware and can use the option if they
run into issues, but otherwise the option is not
visible/used.

PR-URL: #3890
Fixes: nodejs/Release#49
Reviewed-By: Myles Borins <[email protected]>
Reviewed-By: James Snell <[email protected]>
Reviewed-By: Rod Vagg <[email protected]>
Reviewed-By: Shigeki Ohtsu <[email protected]>
@mhdawson
Copy link
Member

I believe this is done I think it should be closed.

@jasnell jasnell closed this as completed Jan 11, 2016
jBarz pushed a commit to ibmruntimes/node that referenced this issue Nov 4, 2016
As part of the fix for logjam, node was upgraded to a
level of openssl which rejects connections to servers that
are using keys smaller than 768 bits. It is still possible,
however, to create a server that uses a smaller key size
and and older client may be able to connect to it.

This PR moves us to a secure by default stance on the
server side as well, preventing the creation of a server
using a dhe key size less than 768. This can be overridden
with the command line option which is also added.

It is derived from

nodejs/node@9b35be5

which was landed in later io.js/node versions but makes
the limit 1024.  This PR uses the smaller limit in order
to meet the recomendations for logjam while matching was
was done on the client side in openssl to minimize the
potential impacton users.

The command line option will only be documented in the
release notes and will not be added to the tls
documentation.  The goal is that people who are
upgrading are aware and can use the option if they
run into issues, but otherwise the option is not
visible/used.

PR-URL: nodejs/node#3890
Fixes: nodejs/Release#49
Reviewed-By: Myles Borins <[email protected]>
Reviewed-By: James Snell <[email protected]>
Reviewed-By: Rod Vagg <[email protected]>
Reviewed-By: Shigeki Ohtsu <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants