<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openssl.org/index.php?action=history&amp;feed=atom&amp;title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG</id>
	<title>SSL OP SAFARI ECDHE ECDSA BUG - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openssl.org/index.php?action=history&amp;feed=atom&amp;title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG"/>
	<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;action=history"/>
	<updated>2026-04-18T13:02:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.13</generator>
	<entry>
		<id>https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1383&amp;oldid=prev</id>
		<title>Jwalton: Added info on patch</title>
		<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1383&amp;oldid=prev"/>
		<updated>2013-12-11T02:00:21Z</updated>

		<summary type="html">&lt;p&gt;Added info on patch&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:00, 11 December 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l4&quot; &gt;Line 4:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 4:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The patch was discussed at [http://www.mail-archive.com/openssl-dev@openssl.org/msg32629.html Apple are, apparently, dicks...], and provided by Adam Langley and Rob Stradling.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The patch was discussed at [http://www.mail-archive.com/openssl-dev@openssl.org/msg32629.html Apple are, apparently, dicks...], and provided by Adam Langley and Rob Stradling.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== OpenSSL Patch ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;The Apple bug patch is available at [http://openssl.6102.n7.nabble.com/openssl-org-3068-PATCH-Safari-broken-ECDHE-ECDSA-workaround-td45432.html &amp;lt;nowiki&amp;gt;[openssl.org #3068] [PATCH] Safari broken ECDHE-ECDSA workaround&amp;lt;/nowiki&amp;gt;]. The patch attempts to fingerprint Apple Safari clients based on &amp;lt;tt&amp;gt;elliptic_curves&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;ec_point_formats&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;signature_algorithms&amp;lt;/tt&amp;gt;. If a match is made, then &amp;lt;tt&amp;gt;is_probably_safari&amp;lt;/tt&amp;gt; is set in the &amp;lt;tt&amp;gt;SSL*&amp;lt;/tt&amp;gt; context. The server will later disable ECDHE-ECDSA ciphers on the context (algorithm types &amp;lt;tt&amp;gt;SSL_kEECDH&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;SSL_aECDSA&amp;lt;/tt&amp;gt;).&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Its not possible to differentiate between broken and non-broken implementations, so the fix is applied to all Apple Safari clients. It will also apply to non-Apple clients *if* they use the same extension blocks as Apple clients.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Manual Workaround (OpenSSL) ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Manual Workaround (OpenSSL) ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Jwalton</name></author>
	</entry>
	<entry>
		<id>https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1382&amp;oldid=prev</id>
		<title>Jwalton: Added SSL_OP_CIPHER_SERVER_PREFERENCE.</title>
		<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1382&amp;oldid=prev"/>
		<updated>2013-12-11T01:40:00Z</updated>

		<summary type="html">&lt;p&gt;Added SSL_OP_CIPHER_SERVER_PREFERENCE.&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:40, 11 December 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot; &gt;Line 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Manual Workaround (OpenSSL) ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Manual Workaround (OpenSSL) ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;According to Rob Stradling at [http://openssl.6102.n7.nabble.com/Questions-on-SSL-OP-SAFARI-ECDHE-ECDSA-BUG-td47614.html Questions on SSL_OP_SAFARI_ECDHE_ECDSA_BUG], the following &amp;lt;tt&amp;gt;cipher_list&amp;lt;/tt&amp;gt; work around should be possible for those who would (1) like a fix before OpenSSL releases its next stable versions, or (2) don't want to use &amp;lt;tt&amp;gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;lt;/tt&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;According to Rob Stradling at [http://openssl.6102.n7.nabble.com/Questions-on-SSL-OP-SAFARI-ECDHE-ECDSA-BUG-td47614.html Questions on SSL_OP_SAFARI_ECDHE_ECDSA_BUG], the following &amp;lt;tt&amp;gt;cipher_list&amp;lt;/tt&amp;gt; work around should be possible for those who would (1) like a fix before OpenSSL releases its next stable versions, or (2) don't want to use &amp;lt;tt&amp;gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;lt;/tt&amp;gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;. &amp;lt;tt&amp;gt;SSL_OP_CIPHER_SERVER_PREFERENCE&amp;lt;/tt&amp;gt; is probably a necessary option to ensure the server's cipher list preferences are used&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;1. Ensure that these four ciphers are all disabled on your server (since these are the only ciphers that are affected by the Safari/OSX bug):&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;1. Ensure that these four ciphers are all disabled on your server (since these are the only ciphers that are affected by the Safari/OSX bug):&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Jwalton</name></author>
	</entry>
	<entry>
		<id>https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1381&amp;oldid=prev</id>
		<title>Matt: Spelling correction</title>
		<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1381&amp;oldid=prev"/>
		<updated>2013-12-10T23:44:30Z</updated>

		<summary type="html">&lt;p&gt;Spelling correction&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:44, 10 December 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l34&quot; &gt;Line 34:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 34:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The broken versions of Safari/OSX don't support GCM (or DSS), so enabling and even preferring ECDHE-ECDSA-AES256-GCM-SHA384 and ECDHE-ECDSA-AES128-GCM-SHA256 on your server shouldn't cause any problems.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The broken versions of Safari/OSX don't support GCM (or DSS), so enabling and even preferring ECDHE-ECDSA-AES256-GCM-SHA384 and ECDHE-ECDSA-AES128-GCM-SHA256 on your server shouldn't cause any problems.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;''Note:'' be &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;weary &lt;/del&gt;of RC4 because it has serious vulnerabilities when used in TLS. See AlFardan, Bernstein (et al), [http://cr.yp.to/streamciphers/rc4biases-20130708.pdf On the Security of RC4 in TLS and WPA].&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;''Note:'' be &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;wary &lt;/ins&gt;of RC4 because it has serious vulnerabilities when used in TLS. See AlFardan, Bernstein (et al), [http://cr.yp.to/streamciphers/rc4biases-20130708.pdf On the Security of RC4 in TLS and WPA].&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Manual Workaround (Apple) ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Manual Workaround (Apple) ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;For Apple-based, non-Safari applications, it appears an application level work around is available. According to Mac OS X's [https://developer.apple.com/library/ios/documentation/security/Reference/secureTransportRef/Reference/reference.html SecureTransport] and iOS's [https://developer.apple.com/library/ios/documentation/security/Reference/secureTransportRef/Reference/reference.html SecureTransport], users of the broken &amp;lt;tt&amp;gt;SecureTransport&amp;lt;/tt&amp;gt; should be able to call &amp;lt;tt&amp;gt;SSLSetEnabledCiphers&amp;lt;/tt&amp;gt; to remove the &amp;lt;tt&amp;gt;ECDHE-ECDSA-*&amp;lt;/tt&amp;gt; ciphers from the list.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;For Apple-based, non-Safari applications, it appears an application level work around is available. According to Mac OS X's [https://developer.apple.com/library/ios/documentation/security/Reference/secureTransportRef/Reference/reference.html SecureTransport] and iOS's [https://developer.apple.com/library/ios/documentation/security/Reference/secureTransportRef/Reference/reference.html SecureTransport], users of the broken &amp;lt;tt&amp;gt;SecureTransport&amp;lt;/tt&amp;gt; should be able to call &amp;lt;tt&amp;gt;SSLSetEnabledCiphers&amp;lt;/tt&amp;gt; to remove the &amp;lt;tt&amp;gt;ECDHE-ECDSA-*&amp;lt;/tt&amp;gt; ciphers from the list.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Matt</name></author>
	</entry>
	<entry>
		<id>https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1380&amp;oldid=prev</id>
		<title>Jwalton: Created page with &quot;'''&lt;tt&gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&lt;/tt&gt;''' is an Apple bug where Safari fails to negotiate &lt;tt&gt;ECDHE-ECDSA&lt;/tt&gt; ciphers as advertised. The bug is present in OS X 10.8 through 1…&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;diff=1380&amp;oldid=prev"/>
		<updated>2013-12-10T23:37:33Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;&amp;lt;tt&amp;gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;lt;/tt&amp;gt;&amp;#039;&amp;#039;&amp;#039; is an Apple bug where Safari fails to negotiate &amp;lt;tt&amp;gt;ECDHE-ECDSA&amp;lt;/tt&amp;gt; ciphers as advertised. The bug is present in OS X 10.8 through 1…&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''&amp;lt;tt&amp;gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;lt;/tt&amp;gt;''' is an Apple bug where Safari fails to negotiate &amp;lt;tt&amp;gt;ECDHE-ECDSA&amp;lt;/tt&amp;gt; ciphers as advertised. The bug is present in OS X 10.8 through 10.8.3, and was allegedly fixed in OS X 10.8.4. Apple did not provide a hotfix or apply the fix to the affected versions of its &amp;lt;tt&amp;gt;SecureTransport&amp;lt;/tt&amp;gt;, so 10.8 through 10.8.3 will remain broken.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;lt;/tt&amp;gt; is a context option for OpenSSL ''greater than'' 1.0.1e, ''greater than'' 0.9.8y, 1.0.2, and 1.1.0. For updated versions of OpenSSL, the option is included in &amp;lt;tt&amp;gt;SSL_OP_ALL&amp;lt;/tt&amp;gt;. Existing application compiled using the previous value of &amp;lt;tt&amp;gt;SSL_OP_ALL&amp;lt;/tt&amp;gt; will need to be recompiled. &lt;br /&gt;
&lt;br /&gt;
The patch was discussed at [http://www.mail-archive.com/openssl-dev@openssl.org/msg32629.html Apple are, apparently, dicks...], and provided by Adam Langley and Rob Stradling.&lt;br /&gt;
&lt;br /&gt;
== Manual Workaround (OpenSSL) ==&lt;br /&gt;
&lt;br /&gt;
According to Rob Stradling at [http://openssl.6102.n7.nabble.com/Questions-on-SSL-OP-SAFARI-ECDHE-ECDSA-BUG-td47614.html Questions on SSL_OP_SAFARI_ECDHE_ECDSA_BUG], the following &amp;lt;tt&amp;gt;cipher_list&amp;lt;/tt&amp;gt; work around should be possible for those who would (1) like a fix before OpenSSL releases its next stable versions, or (2) don't want to use &amp;lt;tt&amp;gt;SSL_OP_SAFARI_ECDHE_ECDSA_BUG&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
1. Ensure that these four ciphers are all disabled on your server (since these are the only ciphers that are affected by the Safari/OSX bug):&lt;br /&gt;
 * ECDHE-ECDSA-AES256-SHA&lt;br /&gt;
 * ECDHE-ECDSA-AES128-SHA&lt;br /&gt;
 * ECDHE-ECDSA-RC4-SHA&lt;br /&gt;
 * ECDHE-ECDSA-DES-CBC3-SHA&lt;br /&gt;
&lt;br /&gt;
2. If you want to enable one or more of those four ECDHE-ECDSA ciphers, then ensure that your server prefers at least one of the following ciphers (that Safari/OSX also offers) ahead of them:&lt;br /&gt;
&lt;br /&gt;
 * ECDH-RSA-AES128-SHA&lt;br /&gt;
 * ECDH-RSA-AES256-SHA&lt;br /&gt;
 * ECDH-RSA-RC4-SHA&lt;br /&gt;
 * ECDH-RSA-DES-CBC3-SHA&lt;br /&gt;
 * ECDHE-RSA-AES256-SHA&lt;br /&gt;
 * ECDHE-RSA-AES128-SHA&lt;br /&gt;
 * ECDHE-RSA-RC4-SHA&lt;br /&gt;
 * ECDHE-RSA-DES-CBC3-SHA&lt;br /&gt;
 * AES128-SHA&lt;br /&gt;
 * AES256-SHA&lt;br /&gt;
 * DES-CBC3-SHA&lt;br /&gt;
 * DHE-RSA-AES128-SHA&lt;br /&gt;
 * DHE-RSA-AES256-SHA&lt;br /&gt;
 * EDH-RSA-DES-CBC3-SHA&lt;br /&gt;
&lt;br /&gt;
The broken versions of Safari/OSX don't support GCM (or DSS), so enabling and even preferring ECDHE-ECDSA-AES256-GCM-SHA384 and ECDHE-ECDSA-AES128-GCM-SHA256 on your server shouldn't cause any problems.&lt;br /&gt;
&lt;br /&gt;
''Note:'' be weary of RC4 because it has serious vulnerabilities when used in TLS. See AlFardan, Bernstein (et al), [http://cr.yp.to/streamciphers/rc4biases-20130708.pdf On the Security of RC4 in TLS and WPA].&lt;br /&gt;
&lt;br /&gt;
== Manual Workaround (Apple) ==&lt;br /&gt;
&lt;br /&gt;
For Apple-based, non-Safari applications, it appears an application level work around is available. According to Mac OS X's [https://developer.apple.com/library/ios/documentation/security/Reference/secureTransportRef/Reference/reference.html SecureTransport] and iOS's [https://developer.apple.com/library/ios/documentation/security/Reference/secureTransportRef/Reference/reference.html SecureTransport], users of the broken &amp;lt;tt&amp;gt;SecureTransport&amp;lt;/tt&amp;gt; should be able to call &amp;lt;tt&amp;gt;SSLSetEnabledCiphers&amp;lt;/tt&amp;gt; to remove the &amp;lt;tt&amp;gt;ECDHE-ECDSA-*&amp;lt;/tt&amp;gt; ciphers from the list.&lt;/div&gt;</summary>
		<author><name>Jwalton</name></author>
	</entry>
</feed>