TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSL in Debian Unstable drops TLS 1.0/1.1 support

147 pointsby jhealyalmost 8 years ago

10 comments

rossyalmost 8 years ago
This makes me anxious, but I&#x27;m not sure if my anxiety is valid. I didn&#x27;t know it was okay to disable TLS 1.0&#x2F;1.1 this early. Correct me if I&#x27;m wrong, but this will affect all HTTPS web requests and web serving, as well as mail delivery and receipt from Debian sid. I&#x27;m not sure I want to only be able to surf ~90% of the encrypted web[1] and I&#x27;m not sure I&#x27;m ready to drop support for Android 4.3[2] or stock Windows 7&#x2F;IE (which has TLS 1.2 switched off in Internet Options.) Not to mention all the mail servers out there running outdated crypto. I have mail in my inbox (from eg. Amazon Pay) received over TLS 1.0. As far as I understand, supporting outdated protocols like TLS 1.0 is only a problem if there is a downgrade attack that can force a server and client that speak TLS 1.2 to communicate over TLS 1.0. Otherwise, it should be fine to support TLS 1.0 to speak to older clients, while giving newer clients the option to speak over TLS 1.2.<p>Hopefully this announcement is correct in the assumption that support for TLS 1.2 will be high enough when Buster is released.<p>[1]: <a href="https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssl-pulse&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssl-pulse&#x2F;</a> [2]: <a href="https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;clients.html" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;clients.html</a>
评论 #14945720 未加载
评论 #14946007 未加载
评论 #14947229 未加载
DCKingalmost 8 years ago
Last year I disabled TLS 1.0&#x2F;1.1 on my <i>personal server</i> and encountered problems. Turns out Mono (Keepass2Android) and Qt (QBittorrent) libraries on Android for some reason had not enabled higher-than-TLS-1.0 support, although AFAIK they supported it at the time.<p>So yeah, I ended up reenabling TLS 1.0&#x2F;1.1 on a system on which I had <i>full control</i> over the clients connecting to it. Given the difficulty and nature of current attacks, I figured the low risks to me personally weren&#x27;t worth the inconvenience.<p>I commend the Debian project for making the push for this, but I wonder if the world is ready to be TLS 1.2+ only.
hannobalmost 8 years ago
I predict hereby that this change won&#x27;t last long.<p>While cryptographically it&#x27;s the right move (everything below TLS 1.2 with an AEAD is cryptographically broken), this disables connectivity with half of the Internet. There is a huge number of hosts out there running on legacy hardware that won&#x27;t do anything beyond TLS 1.0.
评论 #14945999 未加载
评论 #14946867 未加载
评论 #14945913 未加载
评论 #14947308 未加载
chickenbanealmost 8 years ago
Good. Debian won&#x27;t be making stable any time soon, so a very reasonable timeline.
评论 #14945476 未加载
0x0almost 8 years ago
Seems a little risky especially for SMTP services. Will be interesting to see how this pans out!
snakeanusalmost 8 years ago
I also have disabled all versions before TLS 1.2, any key exchange other than x25519 (I wanted to avoid the NSA curves) and all encryption&#x2F;mac algorithms other than Chacha20-poly1305. It works just fine with the last Firefox ESR and Chromium that way.
user5994461almost 8 years ago
Can we have a reminder, what is the security issue with TLS 1.0 and TLS 1.1?
评论 #14946597 未加载
koolbaalmost 8 years ago
Is there a plugin or setting for Firefox or Chrome that would give me stats on server protocol support for my own interactions?<p>I&#x27;m pretty sure the preference is newer versions of TLS where available. So would be interesting to see if this would have any impact on ones own browsing habits (ignoring the fact that FF has its own TLS lib so wouldn&#x27;t be using OpenSSL anyway).
评论 #14945015 未加载
评论 #14944978 未加载
thinkMOARalmost 8 years ago
Also for MTAs? That&#x27;s a bold move :)
snvzzalmost 8 years ago
What&#x27;s appalling is how they&#x27;re not switching to libressl yet.