Skip to content
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.

Cipher Order Determined by Client #15

Open
sveeke opened this issue Jun 18, 2018 · 2 comments
Open

Cipher Order Determined by Client #15

sveeke opened this issue Jun 18, 2018 · 2 comments
Assignees
Labels
bug-infrastructure Bugs inside SURFnet's infrastructure risk-low Security issues with a low impact
Milestone

Comments

@sveeke
Copy link
Contributor

sveeke commented Jun 18, 2018

The badgr-dev2.edubadges.nl server allows the SSL/TLS cipher to be chosen by the client instead of the server. This could result in a less-than-optimal encryption algorithm being chosen for the encryption of sensitive data.

@sveeke sveeke added bug-infrastructure Bugs inside SURFnet's infrastructure risk-moderate Security issues with a moderate impact labels Jun 18, 2018
@sveeke sveeke added this to the Pilot 2018 milestone Jun 18, 2018
@sveeke
Copy link
Contributor Author

sveeke commented Jun 18, 2018

The badgr-dev2.edubadges.nl server allows the SSL/TLS cipher to be chosen by the client instead of the server. This could result in a less-than-optimal encryption algorithm being chosen for the encryption of sensitive data.

When a TLS connection is established, a handshaking, known as the TLS
Handshake Protocol occurs. Within this handshake, a client hello
(ClientHello) and a server hello (ServerHello) message are passed. First,
the client sends a list of the cipher suites that it supports, in order of
preference. Then the server replies with the cipher suite that it has
selected from the client's list.

When the Cipher order is determined by the client this could result in a
lower encryption of the website traffic than would be possible.

The testssl.sh (www.testssl.sh) was used to find the issue.

./testssl.sh badgr-dev2.edubadges.nl

 Has server cipher order?     nope (NOT ok)

impact:
When the cipher order is determined by the client an attacker could force
the use of a weaker cipher to a clients computer. This could result to the
decryption of the traffic between user and website.

recommendation:
Enable server side cipher preference. In nginx.conf:

ssl_prefer_server_ciphers on;

@sveeke sveeke self-assigned this Jun 18, 2018
@sveeke
Copy link
Contributor Author

sveeke commented Jun 18, 2018

I'll take this one for the new environment.

@sveeke sveeke added risk-low Security issues with a low impact and removed risk-moderate Security issues with a moderate impact labels Jun 18, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug-infrastructure Bugs inside SURFnet's infrastructure risk-low Security issues with a low impact
Projects
None yet
Development

No branches or pull requests

1 participant