[Gluster-devel] Logjam
Emmanuel Dreyfus
manu at netbsd.org
Tue May 26 07:47:19 UTC 2015
Hi
the logjam attack comes in two part. One is about downgrading
cipher choice because a TLS setup allows EWPORT ciphers. glusterfs
can thwart this by setting ssl.cipher-list to something hardened enough
(ECDH:DH:!TLSv1:!aNULL!eNULL seems nice);
Second part is about using pre-computed DH paramaeters. It can be
worked around aither by
- removing DH ciphers, which leads to a lack of diversity we may regret
later
- computing your own DH params using openssl dhparam command. Unfortunately
glusterfs cannot use that.
Adding support for loading a DH parameter file is not very difficult:
/* generate: openssl dhparam 2048 > /etc/ssl/dhparam.pem */
#define DEFAULT_DHPARAM_PATH DEFAULT_ETC_SSL "/dhparam.pem"
/* default: priv->ssl_dhparam = DEFAULT_DHPARAM_PATH; */
/* (...) */
DH *dhpatams;
BIO *bio;
if ((bio = BIO_new_file(priv->ssl_dhparam, "r")) != NULL) {
dhparams = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
SSL_CTX_set_tmp_dh(mctx->ssl_ctx, dhparams);
BIO_free(bio);
} else {
/* display error */
}
I am a bit too busy on other fronts to submit code, but whoever is
interested.... Of course there should also be the code for
setting a transport.socket.ssl-dhparam option so that
DEFAULT_DHPARAM_PATH does not remain hard-coded.
--
Emmanuel Dreyfus
manu at netbsd.org
More information about the Gluster-devel
mailing list