[squid-dev] [PATCH] TLS: Disable client-initiated renegotiation

Paulo Matias matias at ufscar.br
Fri Jun 5 18:02:17 UTC 2015


Hi Christos,

On 05-06-2015 08:16, Tsantilas Christos wrote:
>  Which is the openSSL version in a Debian wheezy system?

libssl package reports version 1.0.1e-2+deb7u16

> My understanding is that openSSL-0.9.8m and later, by default provides protection against this bug.

Yes, OpenSSL >0.9.8m seems to provide protection against the insecure
renegotiation bug. However my patch is for a different (although much less
severe) issue.

The issue consists on the fact that enabling client-initiated
renegotiation, although cryptographically secure, eases mounting DoS
attacks against the server, because it reduces the number of connections
to the server needed to conduct such an attack:
https://community.qualys.com/blogs/securitylabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks

This is a screenshot of the Qualys SSL test running against unpatched
Squid trunk in Debian wheezy:
https://web.archive.org/web/20150605172653/http://i.imgur.com/uDCNm8s.png

For the record, it displays:
"Secure Client-Initiated Renegotiation: Supported - DoS DANGER (more
info)", where the "more info" link points to the blog post referenced
above.

Debian jessie passes the test without issues even without applying the
patch. However we did not investigate if the reason is the OpenSSL
version or if Debian applied some new patch in jessie's package. Just
for the record, the Debian jessie's libssl package version is 1.0.1k-3.

Best regards,
Paulo Matias



More information about the squid-dev mailing list