[Pidgin] #8061: Let the user select trusted ciphers for TLS
Pidgin
trac at pidgin.im
Sun Jul 6 14:30:01 EDT 2014
#8061: Let the user select trusted ciphers for TLS
-------------------------+------------------------
Reporter: ben | Owner:
Type: enhancement | Status: new
Milestone: | Component: libpurple
Version: 2.5.3 | Resolution:
Keywords: ssl, tls |
-------------------------+------------------------
Comment (by belmyst):
I've made this patch to include the above priority string.
But according to [http://blog.lighttpd.net/gnutls-priority-strings.html],
{{{+PFS:+NORMAL:%SSL3_RECORD_VERSION}}}
includes several out of date or insecure ciphers:
{{{
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ECDHE-ECDSA 3DES-CBC
SHA1
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDHE-RSA 3DES-CBC
SHA1
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA 3DES-CBC SHA1
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 DHE-DSS AES-128-GCM AEAD
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE-DSS AES-256-GCM AEAD
TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256 DHE-DSS CAMELLIA-128-GCM
AEAD
TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384 DHE-DSS CAMELLIA-256-GCM
AEAD
TLS_DHE_DSS_WITH_AES_128_CBC_SHA DHE-DSS AES-128-CBC SHA1
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 DHE-DSS AES-128-CBC SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA DHE-DSS AES-256-CBC SHA1
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 DHE-DSS AES-256-CBC SHA256
TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA DHE-DSS CAMELLIA-128-CBC
SHA1
TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256 DHE-DSS CAMELLIA-128-CBC
SHA256
TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA DHE-DSS CAMELLIA-256-CBC
SHA1
TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256 DHE-DSS CAMELLIA-256-CBC
SHA256
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS 3DES-CBC SHA1
TLS_DHE_DSS_WITH_RC4_128_SHA DHE-DSS ARCFOUR-128 SHA1
TLS_RSA_WITH_3DES_EDE_CBC_SHA RSA 3DES-CBC SHA1
TLS_RSA_WITH_RC4_128_MD5 RSA ARCFOUR-128 MD5
}}}
(To decide, I used
[https://community.qualys.com/blogs/securitylabs/2013/08/05/configuring-
apache-nginx-and-openssl-for-forward-secrecy] and
[https://github.com/cloudflare/sslconfig/blob/master/conf] as guides.
I've also excluded elliptic curves not used by eg. Google Chrome and
Firefox.)
As a result, my priority string ended up being {{{+PFS:+NORMAL:!3DES-CBC
:!DHE-DSS:!CURVE-SECP192R1:!CURVE-SECP224R1:!MD5:%SSL3_RECORD_VERSION}}}.
It's my first patch here, so all and every comment is more than welcome :)
--
Ticket URL: <https://developer.pidgin.im/ticket/8061#comment:3>
Pidgin <https://pidgin.im>
Pidgin
More information about the Tracker
mailing list