SSL v3 is an older security protocol with known issues, but still exists as a fallback protocol on many devices.
Vulnerable Products
- Junos OS
- Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series
- ScreenOS
- Junos Space
- STRM/JSA Series
- NSM (server and NSM4000, NSM3000, NSMXpress appliance)
- Standalone IDP
- Firefly Host (vGW Series)
- SBR Carrier.
Products Not Vulnerable
- JunosE
- QFabric Director
- Juniper owned web servers that provide feature support for ScreenOS and SRX (Deep Inspection (DI), AV, and licensing)
Juniper is continuing to investigate our product portfolio for affected software that is not mentioned above. As new information becomes available this document will be updated.
This issue has been assigned CVE-2014-3566.
Solution:
Workaround:
Junos:
Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include:
- Disabling J-Web
- Disable SSL service for JUNOScript and only use Netconf, which makes use of SSH, to make configuration changes
- Limit access to J-Web and XNM-SSL from only trusted networks
On SRX Series services gateways, Junos Pulse also fetches the configuration file via HTTPS. To guard against downgrade/SSLv3 MITM attacks, an alternative workaround may be used to disable SSLv3 negotiation:
1. From the root shell:
root@junos% vi /jail/var/etc/httpd.conf
Change the default config of "
SSLProtocol ALL -SSLV2
" to "SSLProtocol TLSv1
"2. Find the process ID (pid) of httpd and kill/restart it:
root@junos% ps auxw | grep httpd
root@junos% kill -9 (pid of httpd)
OR kill -HUP
(pid of httpd)
*Note: This change will not survive reboots. Additionally, executing the 'restart web-management' CLI command will restart the httpd-gk process which will regenerate the default httpd.conf file, overwriting manual changes. Refer to KB18162 for more information about this workaround.
ScreenOS:
A temporary workaround for the server side of ScreenOS you can disable the HTTPS web user interface and the WebAuth feature. If you disable the HTTPS user interface you would be required to do configuration management over command line (SSH). The command to disable SSL is the following:
unset ssl enable
NSM4000, NSM3000, NSMXpress:
For Apache server listening on port 443:
Edit
/etc/httpd/conf.d/ssl.conf
and change the SSLProtocol entry to:SSLProtocol all
-SSLv2 -SSLv3
and restart HTTPD services.
For webproxy used to download the NSM client on port 8443:
Edit the /usr/netscreen/GuiSvr/lib/webproxy/conf/server.xml
from:
from:
clientAuth="false" sslProtocol="SSL" keystoreFile="VAR-NSROOT-VAR/GuiSvr/lib/webproxy/conf/.webproxy_keystore"
to:
clientAuth="false"
sslProtocols="TLSv1,TLSv1.1,TLSv1.2"
keystoreFile="VAR-NSROOT-VAR/GuiSvr/lib/webproxy/conf/.webproxy_keystore"
and resart GuiSvr.
Client Side Mitigation: