Re: Bug#804196: midori gets bad results from https://www.howsmyssl.com/
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Midori Web Browser |
In Progress
|
Undecided
|
Unassigned | ||
midori (Debian) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
affects midori
affects debian/midori
status confirmed
On Tuesday, November 17 2015, Alberto Garcia wrote:
> On Mon, Nov 16, 2015 at 07:17:54PM -0500, Sergio Durigan Junior wrote:
>
>> After investigating it a bit, I found that libwebkitgtk is the
>> responsible for setting the G_TLS_GNUTLS_
>> variable.
>
> This has to be done very early in main() and libwebkitgtk-* cannot
> guarantee that, so it's the application's reponsibility to do it.
>
> Packages using the WebKit2 API (libwebkit2gtk-*) have multiple
> processes and the Web and Network processes can do that themselves,
> but that's not possible for apps using the WebKit1 API (like Midori).
Thanks, Alberto.
I am filing a bug upstream about this, and I intend to submit a patch
soon.
Cheers,
--
Sergio
GPG key ID: 237A 54B1 0287 28BF 00EF 31F4 D0EB 7628 65FC 5E36
Please send encrypted e-mail if possible
http://
Related branches
- Cris Dywan: Pending requested
-
Diff: 15 lines (+5/-0)1 file modifiedmidori/main.c (+5/-0)
Changed in midori: | |
status: | New → In Progress |
assignee: | nobody → Sergio Durigan Junior (sergiodj) |
Changed in midori: | |
assignee: | Sergio Durigan Junior (sergiodj) → nobody |
I'm seeing "Probably Okay" in both the latest Firefox and in Midori (webkit1/gtk2, libsoup 2.52.2, gnutls 3.4.8 on Arch Linux), but with a much longer list of ciphers for Midori:
TLS_ECDHE_ ECDSA_WITH_ AES_128_ GCM_SHA256 ECDSA_WITH_ AES_256_ GCM_SHA384 ECDSA_WITH_ CAMELLIA_ 128_GCM_ SHA256 ECDSA_WITH_ CAMELLIA_ 256_GCM_ SHA384 ECDSA_WITH_ AES_128_ CBC_SHA ECDSA_WITH_ AES_128_ CBC_SHA256 ECDSA_WITH_ AES_256_ CBC_SHA ECDSA_WITH_ AES_256_ CBC_SHA384 ECDSA_WITH_ CAMELLIA_ 128_CBC_ SHA256 ECDSA_WITH_ CAMELLIA_ 256_CBC_ SHA384 ECDSA_WITH_ AES_128_ CCM ECDSA_WITH_ AES_256_ CCM ECDSA_WITH_ 3DES_EDE_ CBC_SHA RSA_WITH_ AES_128_ GCM_SHA256 RSA_WITH_ AES_256_ GCM_SHA384 RSA_WITH_ CAMELLIA_ 128_GCM_ SHA256 RSA_WITH_ CAMELLIA_ 256_GCM_ SHA384 RSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA256 RSA_WITH_ AES_256_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA384 RSA_WITH_ CAMELLIA_ 128_CBC_ SHA256 RSA_WITH_ CAMELLIA_ 256_CBC_ SHA384 RSA_WITH_ 3DES_EDE_ CBC_SHA WITH_AES_ 128_GCM_ SHA256 WITH_AES_ 256_GCM_ SHA384 WITH_CAMELLIA_ 128_GCM_ SHA256 WITH_CAMELLIA_ 256_GCM_ SHA384 WITH_AES_ 128_CBC_ SHA WITH_AES_ 128_CBC_ SHA256 WITH_AES_ 256_CBC_ SHA WITH_AES_ 256_CBC_ SHA256 WITH_CAMELLIA_ 128_CBC_ SHA WITH_CAMELLIA_ 128_CBC_ SHA256 WITH_CAMELLIA_ 256_CBC_ SHA WITH_CAMELLIA_ 256_CBC_ SHA256 WITH_AES_ 128_CCM WITH_AES_ 256_CCM WITH_3DES_ EDE_CBC_ SHA RSA_WITH_ AES_128_ GCM_SHA256 RSA_WITH_ AES_256_ GCM_SHA384 RSA_WITH_ CAMELLIA_ 128_GCM_ SHA256 RSA_WITH_ CAMELLIA_ 256_GCM_ SHA384 RSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA256 RSA_WITH_ AES_256_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA256 RSA_WITH_ CAMELLIA_ 128_CBC_ SHA RSA_WITH_ CAMELLIA_ 128_CBC_ SHA256 RSA_WITH_ CAMELLIA_ 256_CBC_ SHA RSA_WITH_ CAMELLIA_ 256_CBC_ SHA256 RSA_WITH_ AES_128_ CCM RSA_WITH_ AES_256_ CCM RSA_WITH_ 3DES_EDE_ CBC_SHA
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_RSA_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
TLS_DHE_
Compared to these for Firefox:
TLS_ECDHE_ ECDSA_WITH_ AES_128_ GCM_SHA256 RSA_WITH_ AES_128_ GCM_SHA256 ECDSA_WITH_ AES_256_ CBC_SHA ECDSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA WITH_AES_ 128_CBC_ SHA WITH_AES_ 256_CBC_ SHA WITH_3DES_ EDE_CBC_ SHA
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_ECDHE_
TLS_DHE_
TLS_DHE_
TLS_RSA_
TLS_RSA_
TLS_RSA_
Where can one go to learn which ciphers are insecure and why?