Hamparian,Don
2014-10-21 16:36:39 UTC
Hi all, it's been a busy week of announced security issues and listserv discussion. Instead of responding to the many individual messages in the listserv, I'm summarizing them here.
Poodle Security Issue (see http://googleonlinesecurity.blogspot.nl/2014/10/this-poodle-bites-exploiting-ssl-30.html) and CVE-2014-3566<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566>. This is a medium severity issue as scored by NIST.
We will release an updated V5.7 release that, by default, has SSL 3 turned off and will supply an option to turn it back on. Using SSL 3 is not recommended however there may be some institutions that have old browser versions and need it.
This will also be the behavior for the upcoming V6.0 release. In the V6.1 release, we will also make an improvement to the SSLCipherSuite command to make sure all OpenSSL-supported cipher options are usable by EZproxy. This change, coupled with the new SSL 3 switch, will provide fine-grained control of EZproxy's SSL configuration.
OpenSSL library Version
Also, in the updated V5.7 release and the upcoming V6.0 release we will build against OpenSSL 0.9.8zc. This update will resolve CVE 2014-3513 (Rated HIGH by OpenSSL) and CVE 2014-3567 (rated Medium by OpenSSL).
Also, OpenSSL announced end of support for OpenSSL version 0.9.8 on December 31 2015. We will build EZproxy V6 on OpenSSL V1 (the next release of OpenSSL) and have it available by July 2015.
The way we build EZproxy with OpenSSL (Why don't you dynamically link against OpenSSL?)
Today we statically link OpenSSL's binary library with EZproxy. We do this because this build method makes installation of EZproxy much easier for our EZproxy institutions. The vast majority of our institutions are not advanced systems administrators and by shipping EZProxy this way, we help simplify the institution's installation and maintenance process for EZproxy - the institution doesn't have to track and manage the OpenSSL version on their system.
We are going to further evaluate whether or not we should build EZproxy by dynamically linking OpenSSL, but we have no current plans to build EZproxy that way.
Security issue reported as CVE-2014-3660<https://access.redhat.com/security/cve/CVE-2014-3660> (libxml denial of service) - rated "Moderate"
EZproxy has a potential to be affected by this issue, however the access points are in not frequently used EZproxy facilities. We will make the recommended change that this CVE recommends in the V6.0 release of EZproxy.
Supply a 64 bit build of EZproxy
Newer Windows and Linux systems are 64 bit-based operating systems, which provide a much larger address space for programs like EZproxy. Very few EZproxy institutions are seeing this memory limit, however a few are starting to bump up against it.
In some cases, a 64 bit version of the same program (such as the 64 bit Chrome browser) will run slightly faster than the 32 bit equivalent. Both Linux and Windows have very good facilities for running 32 bit applications on 64 bit operating systems.
However the more significant issue for EZproxy is the memory limit. Because of this potential (and it's still pretty rare) issue, we are planning to provide 64 bit builds of EZproxy V6.x in the future.
Don Hamparian
Sr. Product Manager,
EZproxy and Identity Management
OCLC
***@oclc.org<mailto:***@oclc.org>
Voice 614-764-6017
Skype donhamp2
---
You are currently subscribed to ezproxy as: gee-***@m.gmane.org.
To unsubscribe, send request to ***@itec.suny.edu
Poodle Security Issue (see http://googleonlinesecurity.blogspot.nl/2014/10/this-poodle-bites-exploiting-ssl-30.html) and CVE-2014-3566<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566>. This is a medium severity issue as scored by NIST.
We will release an updated V5.7 release that, by default, has SSL 3 turned off and will supply an option to turn it back on. Using SSL 3 is not recommended however there may be some institutions that have old browser versions and need it.
This will also be the behavior for the upcoming V6.0 release. In the V6.1 release, we will also make an improvement to the SSLCipherSuite command to make sure all OpenSSL-supported cipher options are usable by EZproxy. This change, coupled with the new SSL 3 switch, will provide fine-grained control of EZproxy's SSL configuration.
OpenSSL library Version
Also, in the updated V5.7 release and the upcoming V6.0 release we will build against OpenSSL 0.9.8zc. This update will resolve CVE 2014-3513 (Rated HIGH by OpenSSL) and CVE 2014-3567 (rated Medium by OpenSSL).
Also, OpenSSL announced end of support for OpenSSL version 0.9.8 on December 31 2015. We will build EZproxy V6 on OpenSSL V1 (the next release of OpenSSL) and have it available by July 2015.
The way we build EZproxy with OpenSSL (Why don't you dynamically link against OpenSSL?)
Today we statically link OpenSSL's binary library with EZproxy. We do this because this build method makes installation of EZproxy much easier for our EZproxy institutions. The vast majority of our institutions are not advanced systems administrators and by shipping EZProxy this way, we help simplify the institution's installation and maintenance process for EZproxy - the institution doesn't have to track and manage the OpenSSL version on their system.
We are going to further evaluate whether or not we should build EZproxy by dynamically linking OpenSSL, but we have no current plans to build EZproxy that way.
Security issue reported as CVE-2014-3660<https://access.redhat.com/security/cve/CVE-2014-3660> (libxml denial of service) - rated "Moderate"
EZproxy has a potential to be affected by this issue, however the access points are in not frequently used EZproxy facilities. We will make the recommended change that this CVE recommends in the V6.0 release of EZproxy.
Supply a 64 bit build of EZproxy
Newer Windows and Linux systems are 64 bit-based operating systems, which provide a much larger address space for programs like EZproxy. Very few EZproxy institutions are seeing this memory limit, however a few are starting to bump up against it.
In some cases, a 64 bit version of the same program (such as the 64 bit Chrome browser) will run slightly faster than the 32 bit equivalent. Both Linux and Windows have very good facilities for running 32 bit applications on 64 bit operating systems.
However the more significant issue for EZproxy is the memory limit. Because of this potential (and it's still pretty rare) issue, we are planning to provide 64 bit builds of EZproxy V6.x in the future.
Don Hamparian
Sr. Product Manager,
EZproxy and Identity Management
OCLC
***@oclc.org<mailto:***@oclc.org>
Voice 614-764-6017
Skype donhamp2
---
You are currently subscribed to ezproxy as: gee-***@m.gmane.org.
To unsubscribe, send request to ***@itec.suny.edu