OpenSSL site-wide compression disable tracking bug
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
| openssl (Ubuntu) |
Undecided
|
Unassigned | ||
| Lucid |
Undecided
|
Unassigned | ||
| Precise |
Undecided
|
Unassigned | ||
| Quantal |
Undecided
|
Unassigned | ||
| Raring |
Undecided
|
Unassigned | ||
| Saucy |
Undecided
|
Unassigned |
Bug Description
This bug is a tracking bug for OpenSSL patches that introduce a new environment variable OPENSSL_
Many applications, such as Apache Webserver, Qt's wrappers, and others, provide controls that can be used to configure if compression is required, allowed, or forbidden.
This bug tracks an update to include a patch from Fedora, http://
I do not know if the compression-related SSL attacks even make sense for SMTP, but some PCI-DSS auditors are flagging Postfix configurations with this flaw. It is safer to turn off compression everywhere it is not necessary.
Seth Arnold (seth-arnold) wrote : | #1 |
tags: | added: verification-needed |
Changed in openssl (Ubuntu Saucy): | |
status: | New → Fix Committed |
Changed in openssl (Ubuntu Raring): | |
status: | New → Fix Committed |
Changed in openssl (Ubuntu Quantal): | |
status: | New → Fix Committed |
Changed in openssl (Ubuntu Precise): | |
status: | New → Fix Committed |
Changed in openssl (Ubuntu Lucid): | |
status: | New → Fix Committed |
Seth Arnold (seth-arnold) wrote : | #2 |
To test this modification, I extended the Ubuntu Security Team's QRT testcase for OpenSSL to run through the entire test suite twice -- once with compression enabled, once with compression disabled, and verify that compression has been enabled or disabled where appropriate. These modifications can be found here: http://
Because the 10.04 LTS Python test suite will exit when the test suite is over I special-cased that distribution to run only the tests with compression enabled. I don't foresee this being a problem, and the modification to run the other set of tests would be readily visible for future updates.
I ran this test suite on all five currently supported distributions: 10.04 LTS, 12.04 LTS, 12.10, 13.04, and Saucy, on KVM VMs running both i386 and AMD64.
Thus, I'd like testing from the larger community to determine if this is suitable for the distribution. Cases when users will need to manually enable compression for compatibility reasons are likely low, as Fedora has shipped with this modification for several months.
I want to know which services do not work 'out of the box' before shipping this update to the larger Ubuntu community.
Thanks.
Seth Arnold (seth-arnold) wrote : | #3 |
To ubuntu-sru: if this passes the verification process, please ping the security team (sarnold). Thanks!
Launchpad Janitor (janitor) wrote : | #4 |
This bug was fixed in the package openssl - 1.0.1e-2ubuntu1.1
---------------
openssl (1.0.1e-2ubuntu1.1) saucy-security; urgency=low
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/
zlib to compress SSL/TLS unless the environment variable
OPENSSL_
initializ
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://
-- Seth Arnold <email address hidden> Mon, 03 Jun 2013 18:14:05 -0700
Changed in openssl (Ubuntu Saucy): | |
status: | Fix Committed → Fix Released |
Theodotos Andreou (theodotos) wrote : | #5 |
Guys I have also failed the PCI test on my SSL enabled postfix and dovecot.
I run TestSSLServer and it says:
CRIME status: vulnerable
I am using Ubuntu 12.04.2 LTS (precise) 64 bit and my openssl version is 1.0.1-4ubuntu5.9.
Is this backported to precise? What is the easiest way to be protected against it? Does the OPENSSL_
Simon Déziel (sdeziel) wrote : | #6 |
@Theodotos, there is a package on it's way for Precise (http://
Theodotos Andreou (theodotos) wrote : | #7 |
OKI enabled the proposed repo and now I got the updated version:
# aptitude show openssl | grep -i version
Version: 1.0.1-4ubuntu5.10
But running TestSSLServer against my dovecot pop3s (port 995) I still get that the system is vulnerable to CRIME.
Compression is supposed to be disabled by default and only enabled when you use the OPENSSL_
Theodotos Andreou (theodotos) wrote : | #8 |
False alarm. I updated openssl but not libssl. Works now. Thanks Simon!
Seth Arnold (seth-arnold) wrote : | #9 |
Theodotos, thanks for the feedback. Please also let us know if you need to set the environment variable for any services, I'd really like to know if there are any services that require compression.
Launchpad Janitor (janitor) wrote : | #10 |
This bug was fixed in the package openssl - 1.0.1-4ubuntu5.10
---------------
openssl (1.0.1-4ubuntu5.10) precise-security; urgency=low
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/
zlib to compress SSL/TLS unless the environment variable
OPENSSL_
initializ
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://
-- Seth Arnold <email address hidden> Mon, 03 Jun 2013 18:13:18 -0700
Changed in openssl (Ubuntu Precise): | |
status: | Fix Committed → Fix Released |
Launchpad Janitor (janitor) wrote : | #11 |
This bug was fixed in the package openssl - 0.9.8k-7ubuntu8.15
---------------
openssl (0.9.8k-
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/
zlib to compress SSL/TLS unless the environment variable
OPENSSL_
initializ
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://
-- Seth Arnold <email address hidden> Mon, 03 Jun 2013 20:37:34 -0700
Changed in openssl (Ubuntu Lucid): | |
status: | Fix Committed → Fix Released |
Launchpad Janitor (janitor) wrote : | #12 |
This bug was fixed in the package openssl - 1.0.1c-3ubuntu2.5
---------------
openssl (1.0.1c-3ubuntu2.5) quantal-security; urgency=low
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/
zlib to compress SSL/TLS unless the environment variable
OPENSSL_
initializ
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://
-- Seth Arnold <email address hidden> Mon, 03 Jun 2013 18:13:33 -0700
Changed in openssl (Ubuntu Quantal): | |
status: | Fix Committed → Fix Released |
Launchpad Janitor (janitor) wrote : | #13 |
This bug was fixed in the package openssl - 1.0.1c-4ubuntu8.1
---------------
openssl (1.0.1c-4ubuntu8.1) raring-security; urgency=low
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/
zlib to compress SSL/TLS unless the environment variable
OPENSSL_
initializ
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://
-- Seth Arnold <email address hidden> Mon, 03 Jun 2013 18:13:47 -0700
Changed in openssl (Ubuntu Raring): | |
status: | Fix Committed → Fix Released |
tags: |
added: verification-done removed: verification-needed |
Pocket copied openssl to proposed.
Please test and give feedback here. See https:/ /wiki.ubuntu. com/Testing/ EnableProposed for documentation on how to enable and use -proposed.
Thank you in advance!