torproject.org using insecure ciphers/protocols (SSLv3, 3DES and RC4)
I just tried to update Tor Browser in Whonix on Qubes OS and got this error: "curl_status_message: [35] - [SSL connect error. The SSL handshaking failed.]". I looked at it a bit closer and it looks like https://www.torproject.org is currently using insecure ciphers. ``` openssl s_client -connect www.torproject.org:443 … Server public key is 4096 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : RC4-MD5 Session-ID: DD04CBDA08AEFB17B0DCF3696B4D09DE761F150E4886E33AB5334B4F1EBD7575 Session-ID-ctx: Master-Key: 99B55DE1DB5319DC11D12C19C4DD1B3A1534331E4FB4E7C14A3C93628E068D970A0F493ED0EB878FA4E183F8F6656A4E Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None Start Time: 1519601291 Timeout : 300 (sec) Verify return code: 0 (ok) ``` Firefox Nightly tells me the cipher in use is: ``` TLS_RSA_WITH_3DES_EDE_CBC_SHA ``` And https://www.ssllabs.com/ssltest/analyze.html?d=www.torproject.org tells me: protocols: ``` Protocols TLS 1.3 No TLS 1.2 No TLS 1.1 No TLS 1.0 Yes SSL 3 INSECURE Yes ``` ciphers: ``` TLS_RSA_WITH_RC4_128_MD5 (0x4) INSECURE 128 TLS_RSA_WITH_RC4_128_SHA (0x5) INSECURE 128 TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) WEAK 112 TLS_RSA_WITH_AES_256_CBC_SHA (0x35) WEAK 256 TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) WEAK 128 ``` **Trac**: **Username**: pege
issue