From 17c8ba1043232ab5223693d283763eebc331c99a Mon Sep 17 00:00:00 2001
From: Mark Reynolds <mreynolds@redhat.com>
Date: Thu, 6 Mar 2014 11:07:24 -0500
Subject: [PATCH 171/225] Ticket 47637 - rsa_null_sha should not be enabled by
default
Bug Description: rsa_null_sha is enabled by default, this can allow unencrypted
traffic over a TLS connection.
Fix Description: Disable rsa_null_sha, just like rsa_null_md5, by default.
https://fedorahosted.org/389/ticket/47637
Reviewed by: rmeggins(Thanks!)
(cherry picked from commit 82b12c97afd34ecc8acfe54baaf0f32bd83a7edf)
(cherry picked from commit 6a24433cd264faa5e78b94bcd11b39d945f38069)
---
ldap/servers/slapd/ssl.c | 15 +++++++++++----
1 file changed, 11 insertions(+), 4 deletions(-)
diff --git a/ldap/servers/slapd/ssl.c b/ldap/servers/slapd/ssl.c
index 61809aa..bbadf93 100644
--- a/ldap/servers/slapd/ssl.c
+++ b/ldap/servers/slapd/ssl.c
@@ -135,8 +135,8 @@ static cipherstruct _conf_ciphers[] = {
{"SSL3","fips_des_sha", SSL_RSA_FIPS_WITH_DES_CBC_SHA}, /* ditto */
{"SSL3","rsa_rc4_40_md5", SSL_RSA_EXPORT_WITH_RC4_40_MD5},
{"SSL3","rsa_rc2_40_md5", SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5},
- {"SSL3","rsa_null_md5", SSL_RSA_WITH_NULL_MD5},
- {"SSL3","rsa_null_sha", SSL_RSA_WITH_NULL_SHA},
+ {"SSL3","rsa_null_md5", SSL_RSA_WITH_NULL_MD5}, /* disabled by default */
+ {"SSL3","rsa_null_sha", SSL_RSA_WITH_NULL_SHA}, /* disabled by default */
{"TLS","tls_rsa_export1024_with_rc4_56_sha", TLS_RSA_EXPORT1024_WITH_RC4_56_SHA},
{"TLS","rsa_rc4_56_sha", TLS_RSA_EXPORT1024_WITH_RC4_56_SHA}, /* ditto */
{"TLS","tls_rsa_export1024_with_des_cbc_sha", TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA},
@@ -265,7 +265,9 @@ _conf_setallciphers(int active, char ***suplist, char ***unsuplist)
* them to activate it by name. */
for(x = 0; _conf_ciphers[x].name; x++) {
PRBool enabled = active ? PR_TRUE : PR_FALSE;
- if(active && !strcmp(_conf_ciphers[x].name, "rsa_null_md5")) {
+ if(active && (!strcmp(_conf_ciphers[x].name, "rsa_null_md5") ||
+ !strcmp(_conf_ciphers[x].name, "rsa_null_sha")))
+ {
continue;
}
if (enabled) {
@@ -317,7 +319,12 @@ _conf_setciphers(char *ciphers)
slapi_ch_free((void **)&suplist); /* strings inside are static */
return NULL;
}
-/* Enable all the ciphers by default and the following while loop would disable the user disabled ones This is needed becuase we added a new set of ciphers in the table . Right now there is no support for this from the console */
+ /*
+ * Enable all the ciphers by default and the following while loop would
+ * disable the user disabled ones. This is needed because we added a new
+ * set of ciphers in the table. Right now there is no support for this
+ * from the console
+ */
_conf_setallciphers(1, &suplist, NULL);
t = ciphers;
--
1.8.1.4