Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(251)

Issue 1366253005: Expose TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 on the deprecated cipher fallback. (Closed)

Created:
5 years, 2 months ago by davidben
Modified:
5 years, 2 months ago
Reviewers:
Ryan Sleevi
CC:
chromium-reviews, cbentzel+watch_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Expose TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 on the deprecated cipher fallback. It's believed that the majority (over 80%) of TLS version downgrades remaining come from out-of-date IIS servers with the AES-GCM bug (crbug/433406). From probing servers some time back, it appears that, of those, the IIS 8.0 ones prefer TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 over the broken GCMs. Adding that cipher may drive the number down enough to be worthwhile. Experimentally add this cipher to the list to see what it does to the metrics. It may yet be worth trying to drop the fallback without this workaround, since the server-side fix is so easy, but run with this a bit to get numbers on what the options are. As we otherwise would not have exposed a new legacy CBC mode cipher, this cipher is placed on the deprecated cipher fallback. This way we can continue to monitor things which need it and hopefully eventually phase it out once the install-base has taken their updates. BUG=536200 Committed: https://crrev.com/91585690d1355c92f7cac0cee08c3ccecb57a6b2 Cr-Commit-Position: refs/heads/master@{#351205}

Patch Set 1 #

Unified diffs Side-by-side diffs Delta from patch set Stats (+10 lines, -3 lines) Patch
M net/socket/ssl_client_socket_openssl.cc View 2 chunks +10 lines, -3 lines 0 comments Download

Messages

Total messages: 11 (2 generated)
davidben
See https://boringssl-review.googlesource.com/#/c/5962/5/include/openssl/ssl.h for documentation on the cipher suite language.
5 years, 2 months ago (2015-09-25 22:25:50 UTC) #2
davidben
On 2015/09/25 22:25:50, David Benjamin wrote: > See https://boringssl-review.googlesource.com/#/c/5962/5/include/openssl/ssl.h > for documentation on the cipher ...
5 years, 2 months ago (2015-09-25 22:39:33 UTC) #3
Ryan Sleevi
LGTM, assuming (a) is the correct interpretation from the comment I left on the other ...
5 years, 2 months ago (2015-09-28 20:30:45 UTC) #4
davidben
On 2015/09/28 20:30:45, Ryan Sleevi wrote: > LGTM, assuming (a) is the correct interpretation from ...
5 years, 2 months ago (2015-09-28 21:27:10 UTC) #5
Ryan Sleevi
Ah, the fact that IIS enforces server preference makes this clearer/easier to reason about :) ...
5 years, 2 months ago (2015-09-28 22:05:37 UTC) #6
davidben
On 2015/09/28 22:05:37, Ryan Sleevi wrote: > Ah, the fact that IIS enforces server preference ...
5 years, 2 months ago (2015-09-28 22:12:08 UTC) #7
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1366253005/1 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1366253005/1
5 years, 2 months ago (2015-09-28 22:13:16 UTC) #9
commit-bot: I haz the power
Committed patchset #1 (id:1)
5 years, 2 months ago (2015-09-28 23:46:16 UTC) #10
commit-bot: I haz the power
5 years, 2 months ago (2015-09-28 23:47:07 UTC) #11
Message was sent while issue was closed.
Patchset 1 (id:??) landed as
https://crrev.com/91585690d1355c92f7cac0cee08c3ccecb57a6b2
Cr-Commit-Position: refs/heads/master@{#351205}

Powered by Google App Engine
This is Rietveld 408576698