13:00:39 #startmeeting Security Team Meeting - Agenda: https://fedoraproject.org/wiki/Security_Team_meetings 13:00:39 Meeting started Thu Oct 16 13:00:39 2014 UTC. The chair is Sparks_too. Information about MeetBot at http://wiki.debian.org/MeetBot. 13:00:39 Useful Commands: #action #agreed #halp #info #idea #link #topic. 13:00:43 #meetingname Fedora Security Team 13:00:43 The meeting name has been set to 'fedora_security_team' 13:00:45 #topic Roll Call 13:00:47 * Sparks_too 13:00:56 Here 13:02:44 .fas bvinecnt 13:02:45 bvincent: 'bvinecnt' Not Found! 13:02:46 .fas bvincent 13:02:48 bvincent: bvincent 'Brandon Vincent' 13:07:18 Well, looks like the same crew at a new time. 13:09:05 * jtaylor90 is here 13:09:40 Okay, lets get started. 13:09:46 #info Participants are reminded to make liberal use of #info #link #help in order to make the minutes "more better" 13:10:00 #topic SSL 3.0 Vulnerability 13:10:11 * Sparks_too is going to deviate a bit from the agenda. 13:10:38 An hour ago, Tomas Mraz started an OpenSSL 1.0.1j build. 13:10:39 The vulnerability of the week, it would seem, is POODLE. 13:10:59 bvincent: Yes. There will likely be other patches coming. 13:11:16 The biggest problem is that SSL 3.0 is fifteen years old. It's time for it to go. 13:11:28 Apparently, even the nossl build option for OpenSSL was broken. 13:11:34 Red Hat's official message is "retire SSL 3.0 as soon as you can". 13:11:36 *nossl3.0 13:12:01 We've been disabling it on everything we can, more than happy to do it (other than the labour) 13:12:18 We've already seen lots of web servers across the Internet disabling SSL 3.0 so that's good. 13:12:40 Will the builds in Fedora be dropping SSL 3.0, or relying on TLS_FALLBACK_SCSV? 13:12:41 Though dovecot 1.x is a thorn in our side (RHEL 5.x) 13:13:30 bvincent: Hopefully dropping and providing TLS_FALLBACK_SCSV 13:13:39 d-caf: Yes, I'm running 2.0 and it's a problem. The ability to change the protocols didn't come about until 2.1. I've got a message in with the packager to see if we can backport that "feature" into what's currently running on all of our stuff. 13:13:50 For RHEL 5.x, which I think supports TLS 1.0 at best - TLS_FALLBACK_SCSV makes sense. 13:14:22 d-caf: the Dovecot stuff also affects RHEL-6 and 4, in addtion to 5. 13:14:24 TLS_FALLBACK_SCSV also helps protect against TLS1.2 to TLS1.0 drops i believe 13:14:28 * jsmith joins a few minutes late 13:14:38 jsmith: Welcome 13:15:03 Sparks_too: Yes, I've seen those as well 13:15:10 In my $dayjob we've been putting together a list of ways to remove SSL 3.0 from our products 13:15:16 #link https://access.redhat.com/articles/1232123 13:15:32 We might want to point to that or create our own on the wiki 13:15:34 d-caf: It does. It never makes sense to drop the protocol to a lower version. 13:15:36 don't forget that TLS_FALLBACK_SCSV only protects applications that do unsafe fallback *and* actually are modified to use TLS_FALLBACK_SCSV 13:16:16 It sounds like most client applications had support for TLS_FALLBACK_SCSV. It's just now reaching OpenSSL. 13:17:04 there are few apps that do re-connect downgrade dance, so "most" sounds misleading 13:17:10 Actually, scrap that. 13:17:20 Chrome has only suppoted it since Feb. 13:17:27 Firefox, Opera, and IE don't support it. 13:17:52 FF is removing support for SSL 3.0 in their next version. 13:18:11 That will solve the problem the proper way. 13:19:35 Does anyone know what internet browser had SSL 3.0 as its highest suite? (e.g. IE 6 + XP or something like that) 13:20:07 Yeah, I think IE 6 doesn't support TLS 13:20:18 Even more of a reason to drop support. 13:21:27 Yep. 13:21:58 #link http://fedoramagazine.org/what-you-need-to-know-about-the-sslv3-poodle-flaw-cve-2014-3566/ 13:22:01 I believe there were some issues with Java 6 prior to update 45 or something 13:22:09 #link http://fedoramagazine.org/more-cve-2014-3566-information-on-red-hats-security-blog/ 13:22:16 regarding dropping SSLv3 13:23:13 d-caf: Likely. Java stuff doesn't seem to go away that easily. 13:24:07 Okay, moving on. 13:24:21 #topic Outstanding BZ Tickets 13:24:27 #info Wednesday's numbers: Critical 4, Important 51, Moderate 352, Low 125, Total 532, Trend -1 13:24:38 #info Current tickets owned: 171 (~32%) 13:24:47 #info Tickets closed: 115 13:24:59 Any tickets that need to be discussed? 13:25:52 Ticket 1145880 got closed as not a bug, I still need to review it more deeply 13:26:07 Okay 13:26:08 #link https://bugzilla.redhat.com/show_bug.cgi?id=1145880 13:26:59 #topic Open floor discussion/questions/comments 13:27:04 Anyone have anything? 13:27:31 Not here 13:27:45 all set here 13:28:12 Okay, we'll lets get back to work! Thanks everyone for coming. 13:28:20 thanks 13:28:27 #endmeeting