But TLS_FALLBACK_SCSV only prevents forced downgrades, and I'm pretty sure that's not the only vector that makes SSLv3 problematic.
I can confirm this from firsthand experience. I disabled SSL3 last night and got "locked" out of WHM from Firefox, my default browser, with the following error:That is correct. FireFox cannot access cPanel, WHM or webmail secure ports when SSLv3 is disabled at WHM »Service Configuration »cPanel Web Services Configuration
An error occurred during a connection to name.hostname.com:2087. Cannot communicate securely with peer: no common encryption algorithm(s). (Error code: ssl_error_no_cypher_overlap)
Yes. I got locked out of WHM last night through Firefox after I disabled SSL3 server-side. Chrome had no problem connecting. Unfortunately, Chrome is not my browser of choice....We are talking about apache and port 443. What about 2083 and 2087 2093 ports? Can somebody confirm that they are also affected?
You can resolve this from the command line by modifying or removing the ssl options from the file /var/cpanel/conf/cpsrvd/ssl_socket_args and restarting cpanel - /etc/init.d/cpanel restartI can confirm this from firsthand experience. I disabled SSL3 last night and got "locked" out of WHM from Firefox, my default browser
Wouldn't what you're suggesting:You can resolve this from the command line by modifying or removing the ssl options from the file /var/cpanel/conf/cpsrvd/ssl_socket_args and restarting cpanel - /etc/init.d/cpanel restart
Still waiting for OpenSSL 1.0.1j to be made available through the CentOS repos. I tried searching/asking on the CentOS forum, but it keeps timing out. Because it's generally not advised by cPanel to update outside the vendor provided repos, I'll wait, I guess. I just hope CentOS doesn't drag their feet on this.I know there is talk about OpenSSL 1.0.1j here, but for any that missed it:
See https://www.openssl.org/news/secadv_20141015.txt
Yes, we have to wait as no fix/patch been issued yet to resolve the cPanel services problem. You can however protect Apache from the vulnerability.Still waiting for OpenSSL 1.0.1j to be made available through the CentOS repos. I tried searching/asking on the CentOS forum, but it keeps timing out. Because it's generally not advised by cPanel to update outside the vendor provided repos, I'll wait, I guess. I just hope CentOS doesn't drag their feet on this.
No. In fact by default the /var/cpanel/conf/cpsrvd/ssl_socket_args file is empty or missing by default. By default it would appear that cPanel loads all ciphers. This file just specifies what ciphersuites it will use if it is defined. That's why if you put -SSLv3 in the cPanel/WHM CipherSuite, then FireFox won't load the WHM.1. Disable SSL logins to cPanel/WHM?
Not sure, but probably. cPanel has moved away from doing things from a command-line interface requiring you to make all of your changes through the cPanel or WHM interface, to make sure it's kosher. That's fine if you have 1 or 2 servers and can easily log into the WHM for each server. But if you're managing 50+ servers, logging into 50+ WHMs isn't ideal (and it's very, very time consuming).2. Be overwritten when cPanel updates?
Yes, we have to wait as no fix/patch been issued yet to resolve the cPanel services problem. You can however protect Apache from the vulnerability.
In WHM at:
Home » Service Configuration » Apache Configuration » Include Editor » Pre Main Include (pre_main_global.conf)
Enter:
SSLProtocol ALL -SSLv2 -SSLv3
Save and restart Apache to complete.
I have even tried copying the "working" entries to notepad and simply added the :-SSLv3 and it still fails to reload.[error] SSL Library Error: 336646329 error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher match
In order to disable the protocol, addAny help would be appreciated...
SSLProtocol all -SSLv2 -SSLv3
SSLHonorCipherOrder on
In order to disable the protocol, add
To your Pre VirtualHost Include instead of your Pre Main.Code:SSLProtocol all -SSLv2 -SSLv3 SSLHonorCipherOrder on
If you still have issues, copy your cipher-list here, as the problem could be that you have no valid cipher configured after you disable the SSLv2 and SSLv3 protocols.
if i remove the -SSLv3 option i get the followingopenssl ciphers -v 'ALL !ADH !NULL !EXPORT56 RC4+RSA +HIGH +MEDIUM -LOW -SSLv3 -SSLv2'
Error in cipher list
13370:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher match:ssl_lib.c:1188:
openssl ciphers -v 'ALL !ADH !NULL !EXPORT56 RC4+RSA +HIGH +MEDIUM -LOW -SSLv2 +TLSv1'
EXP-KRB5-RC4-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(40) Mac=MD5 export
EXP-KRB5-RC2-CBC-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=RC2(40) Mac=MD5 export
EXP-KRB5-DES-CBC-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=DES(40) Mac=MD5 export
EXP-KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(40) Mac=SHA1 export
EXP-KRB5-RC2-CBC-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC2(40) Mac=SHA1 export
EXP-KRB5-DES-CBC-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=DES(40) Mac=SHA1 export
EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH(512) Au=DSS Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA SSLv3 Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 SSLv3 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 SSLv3 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-DSS-AES256-SHA SSLv3 Kx=DH Au=DSS Enc=AES(256) Mac=SHA1
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-DSS-AES128-SHA SSLv3 Kx=DH Au=DSS Enc=AES(128) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
KRB5-DES-CBC3-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=MD5
KRB5-DES-CBC3-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=SHA1
EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1
DES-CBC3-SHA SSLv3 Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
KRB5-RC4-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=MD5
KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=SHA1
RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
RC4-MD5 SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
openssl ciphers -v
As advised by cPanel staff:
============================
In regards to this vulnerability, which is still fairly fresh at this time, the following link from Qualsys indicates some good ciphers to use, and describes how to go about disabling the SSL3 Protocol. Please note these are quite strict, and could cause issues with older browsers, however they are generally more secure.
...