Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
Trac
Trac
  • Project overview
    • Project overview
    • Details
    • Activity
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Operations
    • Operations
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Create a new issue
  • Issue Boards

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • Legacy
  • TracTrac
  • Issues
  • #18274

Closed (moved)
Open
Opened Feb 07, 2016 by bugzilla@bugzilla

3DES_EDE_CBC cipher is weak in the current TBB configuration!

From The Design and Implementation of the Tor Browser [DRAFT]:

we also enable TLS False Start via the Firefox Pref security.ssl.enable_false_start. From TLS False Start https://tools.ietf.org/html/draft-bmoeller-tls-falsestart-00 generally symmetric ciphers with an effective key length of 128 bits or more can be considered strong. In TLS 1.2 [RFC5246], this allows all cipher suites except those using the NULL or 3DES_EDE_CBC ciphers Detected by https://www.ssllabs.com/ssltest/viewMyClient.html TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) 112 In about:config: security.ssl3.rsa_des_ede3_sha;true Why is this security hole still present?

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
Reference: legacy/trac#18274