← Back to team overview

touch-packages team mailing list archive

[Bug 1376447] Re: When forcing TLSv1.2, the cipher list is truncated

 

This is brought to our attention here:

https://twitter.com/andreasdotorg/status/517328756365873152

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1376447

Title:
  When forcing TLSv1.2, the cipher list is truncated

Status in “openssl” package in Ubuntu:
  Invalid
Status in “openssl” source package in Precise:
  Confirmed

Bug description:
  Back in 2012, enabling TLSv1.2 would break connecting to certain
  servers. This was worked around in two ways in Ubuntu 12.04 LTS:

  - OPENSSL_MAX_TLS1_2_CIPHER_LENGTH was set to 50, so that the cipher list sent would be truncated and wouldn't cause failures when connecting to certain servers that couldn't handle > 256 bytes
  - OPENSSL_NO_TLS1_2_CLIENT was set to disable TLSv1.2 for clients by default

  Although TLSv1.2 is disabled by default for clients, if it is forced,
  the cipher list gets truncated.

  This will cause the following issues:
  - Important ciphers may get dropped
  - Secure renegotiation breaks

  Ubuntu 14.04 LTS shipped with TLSv1.2 turned on by default, and two
  years later a lot of problematic equipment has been replaced or
  upgraded.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1376447/+subscriptions


References