touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #41249
[Bug 1400473] Re: Apache 2.2 on Ubuntu 12.04 LTS only supports TLS1.0 which is vulnerable to BEAST attack
Sorry for the incomplete details.
The problem is when I set the SSLProtocol parameter in Apache as
follows:
SSLProtocol all -SSLv2 -SSLv3 -TLSv1
or:
SSLProtocol TLSv1.1 TLSv1.2
I received the following message in the server logs:
[Mon Dec 08 12:32:38 2014] [error] No SSL protocols available [hint:
SSLProtocol]
This is with version 2.2.22-1ubuntu1.7 installed, of the following
packages:
apache2
apache2-mpm-prefork
apache2-utils
apache2.2-bin
apache2.2-common
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1400473
Title:
Apache 2.2 on Ubuntu 12.04 LTS only supports TLS1.0 which is
vulnerable to BEAST attack
Status in openssl package in Ubuntu:
Incomplete
Bug description:
For PCI compliance, one must not be vulnerable to the POODLE or BEAST
or CRIME attacks. POODLE suggests removing SSLv2 and SSLv3, and BEAST
suggests removing TLSv1. However, since TLSv1.1 and TLSv1.2 do not
seem to be supported by apache 2.2 on 12.04 LTS, and since apache 2.4
on 12.04 LTS does not support PHP 5.3.X, the last branch to allow PHP
register_globals, which is required for lots of legacy production code
often used by sites with payment systems, and since Ubuntu 14.04 LTS
does not support apache 2.2, and since Ubuntu 10.04 LTS does not
support SHA256 signed SSL certificates, there may be no feasible way
for someone to run a credit card processing system with any Ubuntu LTS
system if they require both PCI compliance and PHP register_globals
support.
It looks like manually compiling PHP may be the only plausible way to
surmount this issue in this particular circumstance.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1400473/+subscriptions
References