-
Notifications
You must be signed in to change notification settings - Fork 6.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[openssl] add feature to enable ssl3/weak-ssl-ciphers #35196
Conversation
76d46ba
to
b25a426
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just for consistent formatting: no tabs.
Thanks, I've updated my code formatting settings. |
ea8aaaf
to
aec1e9e
Compare
da32e45
to
d5f40af
Compare
d5f40af
to
01fd19d
Compare
01fd19d
to
70d61f0
Compare
Is there something left to do for me? I would really appreciate this to be merged. |
All features are tested successfully in the following triplet:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it a good idea to add a feature that presumably should never be used any longer?
(I'm not necessarily opposed to adding it, but I think we at least need on record a reason why we were in a secure condition and decided to allow an insecure condition)
@@ -58,6 +56,15 @@ if(NOT "tools" IN_LIST FEATURES) | |||
vcpkg_list(APPEND CONFIGURE_OPTIONS no-apps) | |||
endif() | |||
|
|||
if("weak-ssl-ciphers" IN_LIST FEATURES) | |||
vcpkg_list(APPEND CONFIGURE_OPTIONS enable-weak-ssl-ciphers) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For consistency shouldn't these also set no-weak-ssl-ciphers
and/or no-ssl3
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no-weak-ssl-ciphers and no-ssl3 are default values, they do not need to be set.
Put another way: It seems likely to me that this feature was intentionally not added before, so I think we need a reason on record as to why we changed our minds. |
The reason I need this is that I'm working on internal legacy software, which is not supposed to be changed to another cipher. I understand your concerns and that's why I implemented this change as a feature so you have to opt in to enable the insecure ciphers. |
OK, just be aware that actively exploited attacks like CRIME and POODLE are out there, and that SSL 3 has been obsolete for 24 years, and broken for 9 years. There is pretty much no use case that would require encryption that are OK with SSL 3 anymore. Nonetheless, it is an option exposed by upstream, so I'll merge it. |
I removed the changes made in #28690 because they are the default values (see here https://github.com/openssl/openssl/blob/master/Configure#L557).
In addition, I was in need to enable these functionalities, so I added features to enable them when needed.
./vcpkg x-add-version --all
and committing the result.