Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LOGJAM (CVE-2015-4000) testing #107

Closed
ghost opened this issue May 22, 2015 · 7 comments
Closed

LOGJAM (CVE-2015-4000) testing #107

ghost opened this issue May 22, 2015 · 7 comments

Comments

@ghost
Copy link

ghost commented May 22, 2015

Hi,

would be great to have Logjam DH 2048bit check for the "Server Temp Key".

CVE-2015-4000

https://weakdh.org/sysadmin.html

Greetings, f-s

@ghost ghost changed the title LOGJAM detection LOGJAM (CVE-2015-4000) testing May 22, 2015
@drwetter
Copy link
Owner

yes, see #105

@drwetter drwetter reopened this May 25, 2015
drwetter added a commit that referenced this issue May 26, 2015
…k DH param (if openssl supports it)

  FIX #106, $85
- logjam not yet named *#105, #107) but addressed
- --openssl switch
- reorder find_openssl_binary / mybanner
- proper identation of help
@drwetter
Copy link
Owner

The unique DH group is difficult to test for. Currently testssl.sh marks all DH groups with 1024 bit as red and doesn't distinguish between the fixed one which comes e.g. in Apache 2.2 /openssl and a self generated one (e.g. nginx, postfix etc.).

Any clues how to test this uniqueness?

@drwetter
Copy link
Owner

see a76ca52.

Todo: precomputed primes. DH length is being checked for negotiated cipher and in "testsslsh -e'

@teward
Copy link
Contributor

teward commented Jun 3, 2015

For Apache, anything older than 2.4.7 won't have the ability to have any other DH parameters size, and it appears the precomputed primes are included in the binaries. (Perhaps a version string check, for servers which show the version string?) The only thing this might not work well on are older Apache versions which have the changes to permit the extra DH parameter files to be specified, in which case 2048-bit or whatever length is generated is returned instead of 1024.

I think anything under 2048 is bad practice anyways, though, so identifying that 1024 is a little on the 'weak' side may be a good thing to do either way. (cipherli.st and Mozilla's TLS guide both suggest >= 2048 DH parameter size)

@drwetter
Copy link
Owner

drwetter commented Jun 3, 2015

@teward, thx. My question was more how to test it. Likely for openssl the important file is apps/dh1024.pem or rypto/dh/dh1024.pem (educated guess).

It's easy to say "anything under 2048 is bad practice anyways". You should do a bit of a reality check how many sites are still running Apache 2.2. BTW: Ubuntu 12.04 has for their Apache a backport https://twitter.com/drwetter/status/606060434873970689. I put it in production for a couple of systems.
On Windows 1024 DH Bit seems still for newer 2.4 Apache the default (Linux is 2048).

@teward
Copy link
Contributor

teward commented Jun 3, 2015

@drwetter True, I didn't take into account the scope of things using 1024... :/

@drwetter
Copy link
Owner

closing this. For the rest see #120

drwetter added a commit that referenced this issue Sep 6, 2015
…k DH param (if openssl supports it)

  FIX #106, $85
- logjam not yet named *#105, #107) but addressed
- --openssl switch
- reorder find_openssl_binary / mybanner
- proper identation of help
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants