bug-wget
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug-wget] SSL Poodle attack


From: Tim Rühsen
Subject: [Bug-wget] SSL Poodle attack
Date: Wed, 15 Oct 2014 11:57:47 +0200
User-agent: KMail/4.14.1 (Linux/3.16-2-amd64; KDE/4.14.1; x86_64; ; )

Hi,

Google people found a new attack that affects SSLv3.

see
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566

Shortly: there is a design flaw in SSLv3 that implies high security risks.


AFAICS, Wget's default SSL protocol is 'auto' which uses (OpenSSL code)
    case secure_protocol_auto:
      meth = SSLv23_client_method ();
      break;

or (GnuTLS code)
    case secure_protocol_auto:
      break;
(means, the libraries defaults are used, whatever that is).


Should we break compatibility and map 'auto' to TLSv1 ?
For the security of the users.
There are only a very few HTTP servers out there, which do not support TLSv1.

Or should we let the users/maintainers care for appropriate wgetrc settings ?

What do you think ?

Tim

Attachment: signature.asc
Description: This is a digitally signed message part.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]