<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>31190</bug_id>
          
          <creation_ts>2015-08-06 01:44:07 +0300</creation_ts>
          <short_desc>bugzilla server is vulnerable to critical HTTPS protocol attacks</short_desc>
          <delta_ts>2015-08-31 14:03:04 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>2</classification_id>
          <classification>Infrastructure</classification>
          <product>Infrastructure</product>
          <component>bugzilla.altlinux.org</component>
          <version>unspecified</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>https://www.ssllabs.com/ssltest/analyze.html?d=bugzilla.altlinux.org</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Konstantin A Lepikhov (L.A. Kostis)">lakostis</reporter>
          <assigned_to name="Andrey Cherepanov">cas</assigned_to>
          <cc>glebfm</cc>
    
    <cc>ldv</cc>
    
    <cc>mike</cc>
          
          <qa_contact name="Andrey Cherepanov">cas</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>152346</commentid>
    <comment_count>0</comment_count>
    <who name="Konstantin A Lepikhov (L.A. Kostis)">lakostis</who>
    <bug_when>2015-08-06 01:44:07 +0300</bug_when>
    <thetext>Просто оставлю это здесь:

This server supports insecure Diffie-Hellman (DH) key exchange parameters (Logjam). Grade set to F.   MORE INFO »
This server supports 512-bit export suites and might be vulnerable to the FREAK attack. Grade set to F.   MORE INFO »
This server is vulnerable to the POODLE attack. If possible, disable SSL 3 to mitigate. Grade capped to C.   MORE INFO »
Certificate uses a weak signature. When renewing, ensure you upgrade to SHA2.  MORE INFO »
The server supports only older protocols, but not the current best TLS 1.2. Grade capped to C.  MORE INFO »
The server private key is not strong enough. Grade capped to B.
This server accepts the RC4 cipher, which is weak. Grade capped to B.  MORE INFO »
The server does not support Forward Secrecy with the reference browsers.  MORE INFO »
This server&apos;s certificate chain is incomplete. Grade capped to B.

Настоятельно рекомендуется прочесть MORE INFO и таки обновить настройки HTTPS.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>152611</commentid>
    <comment_count>1</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2015-08-31 13:51:18 +0300</bug_when>
    <thetext>bugzilla server чему только не vulnerable.

Вынес https:// в отдельный контейнер от греха подальше.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>152612</commentid>
    <comment_count>2</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2015-08-31 14:03:04 +0300</bug_when>
    <thetext>&quot;Кэширую&quot; текущий ответ по ссылке (т.к. тест небыстрый):

Overall Rating: T
If trust issues are ignored: B

This server&apos;s certificate is not trusted, see below for details.
This server&apos;s certificate chain is incomplete. Grade capped to B.
This server supports TLS_FALLBACK_SCSV to prevent protocol downgrade attacks.
This server supports HTTP Strict Transport Security with long duration.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>