TLS_FALLBACK_SCSV and OpenSSL

Support for security such as Firewalls and securing linux
Post Reply
kafkaah
Posts: 6
Joined: 2015/04/19 23:59:37

TLS_FALLBACK_SCSV and OpenSSL

Post by kafkaah » 2015/04/20 00:20:31

Hi,

According to the info I found, TLS_FALLBACK_SCSV is provided since openssl-1.0.1e-30, and should therefore prevent any openssl fallback exploit.

For some reason, even though the correct version of OpenSSL is installed (openssl-1.0.1e-30.el6.8.x86_64), and Apache is properly configured and was restarted, this simple test fails:

Code: Select all

openssl s_client -servername www.example.com -connect www.example.com:443 -fallback_scsv -tls1_1
This command line should output:

Code: Select all

139919444293448:error:1409443E:SSL routines:SSL3_READ_BYTES:tlsv1 alert inappropriate fallback:s3_pkt.c:1259:SSL alert number 86
but doesn't. The fallback to TLS 1.1 goes through, without error.

This is quite a boggling situation, since a very similar server of mine (they are both running CentOS 6.6), with the exact same OpenSSL version does react in the proper way, by rejecting, with the error message above, the fallback request.

What is happening?

Thanks.

User avatar
avij
Retired Moderator
Posts: 3046
Joined: 2010/12/01 19:25:52
Location: Helsinki, Finland
Contact:

Re: TLS_FALLBACK_SCSV and OpenSSL

Post by avij » 2015/04/20 05:16:01

Perhaps you are using a non-CentOS openssl? You can examine which libraries httpd is using with lsof -n | grep httpd | grep ssl. You can then run rpm -qf /path/sslfilename.so to see which package provides that file, if any.

Another option is that perhaps there's some sort of a reverse proxy in front of the webserver.

kafkaah
Posts: 6
Joined: 2015/04/19 23:59:37

Re: TLS_FALLBACK_SCSV and OpenSSL

Post by kafkaah » 2015/04/20 10:54:04

Many thanks... You are right...

mod_spdy is the culprit... its implementation of mod_ssl does not provide TLS_FALLBACK_SCSV... Totally forgotten about the patch...

Best regards :D

Post Reply