Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:71957 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 221 invoked from network); 2 Feb 2014 00:28:00 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 2 Feb 2014 00:28:00 -0000 Authentication-Results: pb1.pair.com smtp.mail=padraic.brady@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=padraic.brady@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.160.176 as permitted sender) X-PHP-List-Original-Sender: padraic.brady@gmail.com X-Host-Fingerprint: 209.85.160.176 mail-yk0-f176.google.com Received: from [209.85.160.176] ([209.85.160.176:36446] helo=mail-yk0-f176.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id CE/5C-30967-E019DE25 for ; Sat, 01 Feb 2014 19:27:59 -0500 Received: by mail-yk0-f176.google.com with SMTP id 131so6379582ykp.7 for ; Sat, 01 Feb 2014 16:27:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=G5KR/7e/f+CkTPEepOTd+6M3J1mxqTIw/wnrzdZAFHA=; b=RkL6w80eTKXc+ZYxu6sZXzTUbUN3ywxU7Bot9qCkujjTqnq+YN9GG4VvIeKrTeqwRG s/u/ilyxtpTDZYK0DGmTlZ9oPWwulQQBc7TWQ63uaSQWALpWShYBnXfwHNyEkPMB+tg4 wJFDQp1BY3rVrFY1zcfEuo9/fzbgOu8E2upyp+MGP1Lhjws9TeOwErtEv+5Fv5jx/BX2 E5g5dVvsxGsHx+/Kj/bJwM9p1ZuPzGDqu8QWEYLqCvUVM5wpcqarCBPED0H2pKajvFOL ujdehpXv0eEHsUauD8LBu4zjzdpA67tt8hwn9iXPqqS62XYF7hlhEkzqLdBJjirpqAxy XEzA== MIME-Version: 1.0 X-Received: by 10.236.24.196 with SMTP id x44mr78383yhx.92.1391300876094; Sat, 01 Feb 2014 16:27:56 -0800 (PST) Received: by 10.170.215.130 with HTTP; Sat, 1 Feb 2014 16:27:55 -0800 (PST) In-Reply-To: References: <824758DB-57D8-4B4B-BECD-E1F12531FDE0@rouvenwessling.de> Date: Sun, 2 Feb 2014 00:27:55 +0000 Message-ID: To: Daniel Lowrey Cc: Yasuo Ohgaki , =?UTF-8?Q?Rouven_We=C3=9Fling?= , "internals@lists.php.net" Content-Type: multipart/alternative; boundary=089e0122a26e7ed26104f1617a52 Subject: Re: [PHP-DEV] Improved TLS Defaults From: padraic.brady@gmail.com (=?UTF-8?Q?P=C3=A1draic_Brady?=) --089e0122a26e7ed26104f1617a52 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi Daniel, Looking at the openssl output, this eliminates all weak ciphersuites. I'm testing using the Qualys service at: https://www.ssllabs.com/ssltest/viewMyClient.html I have two things to be considered on top of this: 1. If you check the ciphersuite order of the proposed ciphers vs cURL (current HEAD) vs Mozilla (https://wiki.mozilla.org/Security/Server_Side_TL= S), the ciphers which support perfect forward secrecy are dispersed throughout the list for the RFC and cURL so numerous non-PRS ciphers will gain preference over PFS ciphers. PFS has become a big deal recently with people worried about companies having their private keys stolen or handed over on foot of a warrant by a three letter agency. I think we should take this opportunity to follow the trend and that's basically why Mozilla have such a long explicit ordering in their suite. 2. There has been some questions raised about the efficacy of stronger 256 ciphers vs 128 ciphers. The Mozilla list therefore reorders the ciphers to prefer the faster 128 ciphers while still maintaining the preference for PFS first. The base reference for this is: https://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html. This describes an attack valid for AES256 but NOT for AES128. To be fair, the attack should be beyond anyone's computational resources at this time but as the old pessimist's view goes, if it breaks once, it'll probably break again, and again, ad infinitum. So if we were to be extremely cautious, preferring AES128 would be the ticket. Looking around, it's clear that choosing a cipher suite is not an easy task. Mozilla, IE and Chromium all differ. cURL and openssl also differ from the browsers. cURL recently amended its list away from the openssl DEFAULT on foot of a security report but I don't think they put sufficient thought into it and basically relied on openssl's judgement for the most part. In the absence of openssl amending DEFAULT (which may well happen at some point - it was reported to them afterall), I think Mozilla has the better approach. The other outcome of the Mozilla ciphersuite is that it removes all ciphers below 128 (there's about 15 or so below that waterline). These are not reported as weak on the Qualys site or howsmyssl.com, however, so not sure if it's necessary in our case at this time. Paddy -- P=C3=A1draic Brady http://blog.astrumfutura.com http://phpsecurity.readthedocs.org Zend Framework Community Review Team Zend Framework PHP-FIG Representative --089e0122a26e7ed26104f1617a52--