Re: Ofbiz 09-04 piddle bleed fix

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
7 messages Options
Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Jacques Le Roux
Administrator

Le 02/11/2014 21:12, HRC Boston a écrit :

> Hi there--
>
> I am in process of trying to disable sslv3 on our version of of
> ofbiz 09-04, which uses tomcat 5.5.
>
> This is to eliminate the security vulnerability from poodle bleed.
> http://www.symantec.com/connect/blogs/ssl-30-vulnerability-poodle-bug-aka-poodlebleed
>
> We have tried updating the of ofbiz-containers.xml file like below, but it
> did not disable sslv3. Poodle is still there.
>
> I have also seen fixes that update server.xml with something similar.
>
> <property name="sslProtocol" value="TLS"/>
> <property name="sslEnabledProtocols" value="TLSv1,TLSv1.1,TLSv1.2"/>
>
> Has anyone else had luck fixing the poodle issue on Apache ofbiz version
> 09-04?

Did you try to update the embedded Tomcat version? Maybe you need to use Java 7 also...
http://serverfault.com/questions/637649/how-do-i-disable-sslv3-support-in-apache-tomcat

Jacques
>
> Thanks!
>
> The poodle bleed fixer :)
>
Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Poodle Fixer
This post was updated on .
Hi Jacques--

Thanks for your reply.

I am a developer working with our ops team to fix poodle.

We are hoping for a simple fix for this issue as upgrading the software involves more testing then we are able to cover right now.

A lot of the fixes we have seen suggest that tomcat server.xml file is the place to fix poodle. We tried the ofbiz-containers.xml file as noted because that is where our https connector is set up… but no luck there… maybe we need to add a cipher to server.xml? as in the example at the bottom of this page:
http://blog.ricardoamaro.com/content/poodle-sslv3-vulnerability-fix

Your help is very appreciated.

Has anybody had any luck with this fix?

Update /etc/tomcat7/server.xml file with "sslProtocol" line to:
sslProtocol="TLS" ciphers="TLS_RSA_WITH_AES_128_CBC_SHA" sslEnabledProtocols="TLSv1"

 Perhaps we should try a version with only tlsv1 enabled.



Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Poodle Fixer
This post was updated on .
I have started following these jira tickets here:

https://issues.apache.org/jira/browse/HADOOP-11243?jql=text%20~%20%22sslv3%22

we just tried this fix... no luck.


<property name="sslProtocol" value="TLS"/>
        <property name="sslEnabledProtocols" value="TLSv1"/>

had anyone had luck fixing this in ofbiz?
Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Poodle Fixer
right now we think we might have more luck with a java fix to SSLUTIL... in the org framework folder

something very much like this...
https://issues.apache.org/jira/browse/HADOOP-11243?jql=text%20~%20%22sslv3%22
Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Poodle Fixer
This post was updated on .
In reply to this post by Jacques Le Roux
Hi Jacques--

Thank you for your help!

I need to make a correction we are using tomcat6.

When I compile with java7, our build fails so we don't have time to upgrade our server or java most likely…


Per these apache tickets:
https://issues.apache.org/jira/browse/HADOOP-11243?jql=text%20~%20%22sslv3%22
https://issues.apache.org/jira/browse/HDFS-7274?jql=text%20~%20%22sslv3%22

So far I have edited all server.xml files to include:
    <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
               maxThreads="150" scheme="https" secure="true"
               clientAuth="false" sslProtocol="TLS"
               sslEnabledProtocols="TLSv1"/>

All ofbiz-container.xml,test-container.xml files to include:
            <property name="sslProtocol" value="TLS"/>
                <property name="sslEnabledProtocols" value="TLSv1"/>
               
            <property name="ciphers" value="TLS_RSA_WITH_AES_128_CBC_SHA"/>

And I have edited the SSLUtil.java file like below:


+    private final static String[] enabledProtocols = {"TLSv1"};
 
     private static boolean loadedProps = false;
 
@@ -148,8 +149,9 @@
         KeyManager[] km = SSLUtil.getKeyManagers(ks, password, alias);
         TrustManager[] tm = SSLUtil.getTrustManagers();
 
-        SSLContext context = SSLContext.getInstance("SSL");
+        SSLContext context = SSLContext.getInstance("TLS");
         context.init(km, tm, new SecureRandom());
+        context.getDefaultSSLParameters().setProtocols(enabledProtocols);
         return context.getSocketFactory();
     }
 
@@ -162,8 +164,9 @@
             tm = SSLUtil.getTrustManagers();
         }
 
-        SSLContext context = SSLContext.getInstance("SSL");
+        SSLContext context = SSLContext.getInstance("TLS");
         context.init(km, tm, new SecureRandom());
+        context.getDefaultSSLParameters().setProtocols(enabledProtocols);
         return context.getSocketFactory();
     }
 
@@ -179,8 +182,9 @@
         TrustManager[] tm = SSLUtil.getTrustManagers();
         KeyManager[] km = SSLUtil.getKeyManagers(ks, password, alias);
 
-        SSLContext context = SSLContext.getInstance("SSL");
+        SSLContext context = SSLContext.getInstance("TLS");
         context.init(km, tm, new SecureRandom());
+        context.getDefaultSSLParameters().setProtocols(enabledProtocols);
         return context.getServerSocketFactory();
     }
 
@@ -188,8 +192,9 @@
         TrustManager[] tm = SSLUtil.getTrustManagers();
         KeyManager[] km = SSLUtil.getKeyManagers(alias);
 
-        SSLContext context = SSLContext.getInstance("SSL");
+        SSLContext context = SSLContext.getInstance("TLS");
         context.init(km, tm, new SecureRandom());
+     context.getDefaultSSLParameters().setProtocols(enabledProtocols);
         return context.getServerSocketFactory();
     }
 



When I run this command after rebooting SSLV3 is still there:

 openssl s_client -connect localhost:portnumberhere -ssl3

SSL handshake has read 2252 bytes and written 306 bytes
---
New, TLSv1/SSLv3, Cipher is AES128-SHA
Server public key is 1024 bit


ANY IDEAS OTHER IDEAS ON HOW TO DISABLE SSLV3??

Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Poodle Fixer
This post was updated on .
In reply to this post by Jacques Le Roux
we had success with this when developing locally:
     <property name="sslProtocol" value="TLSv1"/>
            <property name="protocols" value="TLSv1"/>

the reason is that it is undoucmented to use protocols instead of sslEnabledProtocols

see https://blogs.atlassian.com/2014/10/ssl-poodle/
http://tomcat.10.x6.nabble.com/How-to-allow-only-TLS-1-1-connections-to-Tomcat-6-0-server-with-https

we get this when trying to connect with ssl3 locally

openssl s_client -connect localhost:portnumberhere -ssl3
CONNECTED(00000003)
6990:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:/SourceCache/src/ssl/s3_pkt.c:290:
Reply | Threaded
Open this post in threaded view
|

Re: Ofbiz 09-04 piddle bleed fix

Jacques Le Roux
Administrator
Thanks Poodle fixer :)

The vulnerability is now fixed in OFBiz trunk and branches releases also https://issues.apache.org/jira/browse/OFBIZ-5848

Tested using nmap from Windows https://www.vanstechelman.eu/content/scan-for-poodle-using-nmap-from-a-windows-machine

Jacques

Le 04/11/2014 19:05, HRC Boston a écrit :

> we had success with this when developing locally:
>       <property name="sslProtocol" value="TLSv1"/>
>              <property name="protocols" value="TLSv1"/>
>
> the reason is that it is undoucmented to use protocols instead of
> sslEnabledProtocols
>
> see https://blogs.atlassian.com/2014/10/ssl-poodle/
> http://tomcat.10.x6.nabble.com/How-to-allow-only-TLS-1-1-connections-to-Tomcat-6-0-server-with-https
>
> we get this when trying to connect with ssl3 locally
>
> openssl s_client -connect localhost:portnumberhere -ssl3
> CONNECTED(00000003)
> 6990:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version
> number:/SourceCache/OpenSSL098/OpenSSL098-47.2/src/ssl/s3_pkt.c:290:
>
>
>
> --
> View this message in context: http://ofbiz.135035.n4.nabble.com/Re-Ofbiz-09-04-piddle-bleed-fix-tp4657772p4657829.html
> Sent from the OFBiz - User mailing list archive at Nabble.com.
>