All of lore.kernel.org
 help / color / mirror / Atom feed
* OpenBMC and https Vulnerable issue.
@ 2019-11-06 19:31 Bruce Mitchell
  2019-11-06 21:52 ` James Feist
  0 siblings, 1 reply; 6+ messages in thread
From: Bruce Mitchell @ 2019-11-06 19:31 UTC (permalink / raw)
  To: OpenBMC Maillist

From my investigations on TLS there seems to be 2 issues that could be corrected with OpenBMC's https:
  1  Secure Client-Initiated Renegotiation     VULNERABLE (NOT ok), DoS threat
  2  LUCKY13 (CVE-2013-0169), experimental     potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS 
     and xc023   ECDHE-ECDSA-AES128-SHA256         ECDH 521   AES         128      TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256

Present standard of practice seems to be to not allow Secure Client-Initiated Renegotiation and to not allow CBC ciphers.

Is this your understanding as well?

Thank you!

-- 
Bruce Mitchell

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2019-11-15 22:45 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-11-06 19:31 OpenBMC and https Vulnerable issue Bruce Mitchell
2019-11-06 21:52 ` James Feist
2019-11-06 22:18   ` Bruce Mitchell
2019-11-06 22:38     ` Bruce Mitchell
2019-11-06 22:43       ` James Feist
2019-11-15 22:45         ` Joseph Reynolds

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.