[Bugs] [Bug 1155630] New: GlusterFS allows insecure SSL modes

bugzilla at redhat.com bugzilla at redhat.com
Wed Oct 22 13:48:05 UTC 2014


https://bugzilla.redhat.com/show_bug.cgi?id=1155630

            Bug ID: 1155630
           Summary: GlusterFS allows insecure SSL modes
           Product: GlusterFS
           Version: 3.4.5
         Component: transport
          Severity: urgent
          Assignee: bugs at gluster.org
          Reporter: kkeithle at redhat.com
                CC: bugs at gluster.org, gluster-bugs at redhat.com,
                    jdarcy at redhat.com
        Depends On: 1155328
            Blocks: 1117822 (glusterfs-3.6.0), 1125231 (glusterfs-3.5.3),
                    1125245 (glusterfs-3.4.6)



+++ This bug was initially created as a clone of Bug #1155328 +++

This is related to the so-called POODLE attack.

    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566

To summarize, POODLE involves a downgrade from TLS to SSLv3, combined with CBC
cipher modes.  Users can avoid the downgrade by using an SSL library that
supports TLS_FALLBACK_SCSV, as recent versions of OpenSSL do.  For users unable
to pursue that strategy, disabling CBC cipher modes is a potential workaround.

   gluster volume set SOMEVOLUME ssl.cipherlist $something

Unfortunately, calculating $something is not trivial.  The "openssl ciphers"
command does not have a built-in "CBC" group to exclude, nor does it support
wildcards.  Therefore, it is necessary to create a list of cipher modes that
meet other criteria (e.g. "HIGH:!SSLv2") and manually delete "CBC" entries to
create a new list.

For users unwilling to calculate their own cipher lists, the default cipher
list in the GlusterFS TLS code should be changed to exclude CBC modes in
addition to other (current) restrictions ensuring optimal security.  In the
very rare case that this might cause a communication failure due to lack of
compatible cipher modes between servers and clients (which would require a very
unlikely combination of GlusterFS and OpenSSL versions), we should also
document how to calculate and apply their own cipher list without making
themselves vulnerable to POODLE.

--- Additional comment from Anand Avati on 2014-10-21 18:17:59 EDT ---

REVIEW: http://review.gluster.org/8962 (socket: disallow CBC cipher modes)
posted (#1) for review on master by Jeff Darcy (jdarcy at redhat.com)


Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1117822
[Bug 1117822] Tracker bug for GlusterFS 3.6.0
https://bugzilla.redhat.com/show_bug.cgi?id=1125231
[Bug 1125231] GlusterFS 3.5.3 Tracker
https://bugzilla.redhat.com/show_bug.cgi?id=1125245
[Bug 1125245] GlusterFS 3.4.6 Tracker
https://bugzilla.redhat.com/show_bug.cgi?id=1155328
[Bug 1155328] GlusterFS allows insecure SSL modes
-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


More information about the Bugs mailing list