[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568488#comment-14568488
 ] 

ASF subversion and git services commented on TS-3649:
-

Commit b8ca26129da735ca704555b485667704f563437e in trafficserver's branch 
refs/heads/5.3.x from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=b8ca261 ]

TS-3649: Add to CHANGES.

(cherry picked from commit 133df337c682ca2ae76a983bfbdea51e2f2ffc82)

Conflicts:
CHANGES


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3632) libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3632?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568485#comment-14568485
 ] 

ASF subversion and git services commented on TS-3632:
-

Commit 41f7209a6e74957d18790780f58374feea5a6eac in trafficserver's branch 
refs/heads/5.3.x from [~jbfavre]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=41f7209 ]

TS-3632: Solve 'undefined reference to symbol MD5_Final@@OPENSSL_1.0.0'.

(cherry picked from commit 442f560ac4412a6cbbba6f69b029def418c9fbe8)


> libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final
> -
>
> Key: TS-3632
> URL: https://issues.apache.org/jira/browse/TS-3632
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Build
>Affects Versions: 5.3.0
>Reporter: Igor Galić
>Assignee: Jean Baptiste Favre
> Fix For: 5.3.1, 6.0.0
>
>
> When building ATS 5.3.0 on Ubuntu >11.04[1,2] a linking failure occurs 
> because of the ordering of the libraries:
> {code}
> libtool: link: c++ -g -O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 
> -Wformat -Wformat-security -Werror=format-security -pipe -Wall 
> -feliminate-unused-debug-symbols -fno-strict-aliasing -Wno-invalid-offsetof 
> -mcx16 -rdynamic -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z -Wl,relro -Wl,-z 
> -Wl,now -o .libs/traffic_manager AddConfigFilesHere.o traffic_manager.o 
> StatProcessor.o StatType.o StatXML.o  ../../mgmt/web2/libweb.a 
> ../../mgmt/api/.libs/libmgmtapilocal.a 
> /«PKGBUILDDIR»/lib/ts/.libs/libtsutil.so -lssl -lcrypto -L/usr/lib 
> ../../mgmt/.libs/libmgmt_lm.a ../../proxy/hdrs/libhdrs.a 
> ../../lib/records/librecords_lm.a ../../lib/ts/.libs/libtsutil.so 
> ../../iocore/eventsystem/libinkevent.a ../../proxy/shared/liberror.a 
> ../../proxy/shared/libdiagsconfig.a -lresolv -ltcl8.5 -lhwloc -lm 
> ../../lib/wccp/libwccp.a ../../lib/tsconfig/.libs/libtsconfig.so -lcap -lpcre 
> -lz -lcrypt -lpthread -lrt -ldl /usr/lib/x86_64-linux-gnu/libxml2.so 
> -Wl,-rpath -Wl,/usr/lib/trafficserver
> /usr/bin/ld: ../../lib/wccp/libwccp.a(WccpMsg.o): undefined reference to 
> symbol 'MD5_Final@@OPENSSL_1.0.0'
> /usr/bin/ld: note: 'MD5_Final@@OPENSSL_1.0.0' is defined in DSO 
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so so 
> try adding it to the linker command line
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so: 
> could not read symbols: Invalid operation
> collect2: ld returned 1 exit status
> make[3]: *** [traffic_manager] Error 1
> make[3]: Leaving directory `/«PKGBUILDDIR»/cmd/traffic_manager'
> make[2]: *** [all-recursive] Error 1
> make[2]: Leaving directory `/«PKGBUILDDIR»/cmd'
> make[1]: *** [all-recursive] Error 1
> make[1]: Leaving directory `/«PKGBUILDDIR»'
> dh_auto_build: make -j1 returned exit code 2
> make: *** [binary-arch] Error 2
> {code}
> [1] 
> https://wiki.debian.org/ToolChain/DSOLinking#Only_link_with_needed_libraries
> [2] https://wiki.ubuntu.com/NattyNarwhal/ToolchainTransition



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3642) proxy.config.http.share_server_sessions not working

2015-06-01 Thread Phil Sorber (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3642?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568490#comment-14568490
 ] 

Phil Sorber commented on TS-3642:
-

Any resolution to this?

> proxy.config.http.share_server_sessions not working
> ---
>
> Key: TS-3642
> URL: https://issues.apache.org/jira/browse/TS-3642
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Configuration
>Affects Versions: 5.3.0
>Reporter: David Carlin
>Assignee: Sudheer Vinukonda
> Fix For: 6.0.0
>
>
> Testing 5.3.0 and I noticed proxy.config.http.share_server_sessions = 1 no 
> longer works.  Saw a 10-15x increase in origin connections;  there appears to 
> be some reuse, I am seeing approximately 1.2-1.3 requests per origin 
> connection.
> Setting "proxy.config.http.server_session_sharing.pool = global" restored 
> expected behavior (Thanks [~sudheerv]!)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568487#comment-14568487
 ] 

ASF subversion and git services commented on TS-3649:
-

Commit d284c9d1a65cec9a7f69aa92547a87a746eb359d in trafficserver's branch 
refs/heads/5.3.x from [~gancho]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=d284c9d ]

TS-3649 Fix for url_sig plugin security issues (crash by HTTP request, 
circumvent signature).

(cherry picked from commit 3f523ea5db49e244f9a09b4752d06031e3f31130)


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568489#comment-14568489
 ] 

ASF subversion and git services commented on TS-3649:
-

Commit 62be18134f670c0fc1884ded025e8314faf3bccb in trafficserver's branch 
refs/heads/5.3.x from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=62be181 ]

TS-3649: Check key length during config parse

(cherry picked from commit 7cae891870a5634dd28f2a679ff3b4f9a9fbe82b)


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3632) libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3632?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568486#comment-14568486
 ] 

ASF subversion and git services commented on TS-3632:
-

Commit 6f0e54499d0bc371a2bbfff821a342ad669414c2 in trafficserver's branch 
refs/heads/5.3.x from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=6f0e544 ]

TS-3632: Add to CHANGES

(cherry picked from commit b2651964fd083237e8c505c4d0d603852c339f64)

Conflicts:
CHANGES


> libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final
> -
>
> Key: TS-3632
> URL: https://issues.apache.org/jira/browse/TS-3632
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Build
>Affects Versions: 5.3.0
>Reporter: Igor Galić
>Assignee: Jean Baptiste Favre
> Fix For: 5.3.1, 6.0.0
>
>
> When building ATS 5.3.0 on Ubuntu >11.04[1,2] a linking failure occurs 
> because of the ordering of the libraries:
> {code}
> libtool: link: c++ -g -O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 
> -Wformat -Wformat-security -Werror=format-security -pipe -Wall 
> -feliminate-unused-debug-symbols -fno-strict-aliasing -Wno-invalid-offsetof 
> -mcx16 -rdynamic -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z -Wl,relro -Wl,-z 
> -Wl,now -o .libs/traffic_manager AddConfigFilesHere.o traffic_manager.o 
> StatProcessor.o StatType.o StatXML.o  ../../mgmt/web2/libweb.a 
> ../../mgmt/api/.libs/libmgmtapilocal.a 
> /«PKGBUILDDIR»/lib/ts/.libs/libtsutil.so -lssl -lcrypto -L/usr/lib 
> ../../mgmt/.libs/libmgmt_lm.a ../../proxy/hdrs/libhdrs.a 
> ../../lib/records/librecords_lm.a ../../lib/ts/.libs/libtsutil.so 
> ../../iocore/eventsystem/libinkevent.a ../../proxy/shared/liberror.a 
> ../../proxy/shared/libdiagsconfig.a -lresolv -ltcl8.5 -lhwloc -lm 
> ../../lib/wccp/libwccp.a ../../lib/tsconfig/.libs/libtsconfig.so -lcap -lpcre 
> -lz -lcrypt -lpthread -lrt -ldl /usr/lib/x86_64-linux-gnu/libxml2.so 
> -Wl,-rpath -Wl,/usr/lib/trafficserver
> /usr/bin/ld: ../../lib/wccp/libwccp.a(WccpMsg.o): undefined reference to 
> symbol 'MD5_Final@@OPENSSL_1.0.0'
> /usr/bin/ld: note: 'MD5_Final@@OPENSSL_1.0.0' is defined in DSO 
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so so 
> try adding it to the linker command line
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so: 
> could not read symbols: Invalid operation
> collect2: ld returned 1 exit status
> make[3]: *** [traffic_manager] Error 1
> make[3]: Leaving directory `/«PKGBUILDDIR»/cmd/traffic_manager'
> make[2]: *** [all-recursive] Error 1
> make[2]: Leaving directory `/«PKGBUILDDIR»/cmd'
> make[1]: *** [all-recursive] Error 1
> make[1]: Leaving directory `/«PKGBUILDDIR»'
> dh_auto_build: make -j1 returned exit code 2
> make: *** [binary-arch] Error 2
> {code}
> [1] 
> https://wiki.debian.org/ToolChain/DSOLinking#Only_link_with_needed_libraries
> [2] https://wiki.ubuntu.com/NattyNarwhal/ToolchainTransition



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3649:

Backport to Version:   (was: 5.3.1)

> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3649:

Fix Version/s: 5.3.1

> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3642) proxy.config.http.share_server_sessions not working

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3642?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3642:

Fix Version/s: 6.0.0

> proxy.config.http.share_server_sessions not working
> ---
>
> Key: TS-3642
> URL: https://issues.apache.org/jira/browse/TS-3642
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Configuration
>Affects Versions: 5.3.0
>Reporter: David Carlin
>Assignee: Sudheer Vinukonda
> Fix For: 6.0.0
>
>
> Testing 5.3.0 and I noticed proxy.config.http.share_server_sessions = 1 no 
> longer works.  Saw a 10-15x increase in origin connections;  there appears to 
> be some reuse, I am seeing approximately 1.2-1.3 requests per origin 
> connection.
> Setting "proxy.config.http.server_session_sharing.pool = global" restored 
> expected behavior (Thanks [~sudheerv]!)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3632) libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3632?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3632:

Fix Version/s: 5.3.1

> libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final
> -
>
> Key: TS-3632
> URL: https://issues.apache.org/jira/browse/TS-3632
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Build
>Affects Versions: 5.3.0
>Reporter: Igor Galić
>Assignee: Jean Baptiste Favre
> Fix For: 5.3.1, 6.0.0
>
>
> When building ATS 5.3.0 on Ubuntu >11.04[1,2] a linking failure occurs 
> because of the ordering of the libraries:
> {code}
> libtool: link: c++ -g -O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 
> -Wformat -Wformat-security -Werror=format-security -pipe -Wall 
> -feliminate-unused-debug-symbols -fno-strict-aliasing -Wno-invalid-offsetof 
> -mcx16 -rdynamic -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z -Wl,relro -Wl,-z 
> -Wl,now -o .libs/traffic_manager AddConfigFilesHere.o traffic_manager.o 
> StatProcessor.o StatType.o StatXML.o  ../../mgmt/web2/libweb.a 
> ../../mgmt/api/.libs/libmgmtapilocal.a 
> /«PKGBUILDDIR»/lib/ts/.libs/libtsutil.so -lssl -lcrypto -L/usr/lib 
> ../../mgmt/.libs/libmgmt_lm.a ../../proxy/hdrs/libhdrs.a 
> ../../lib/records/librecords_lm.a ../../lib/ts/.libs/libtsutil.so 
> ../../iocore/eventsystem/libinkevent.a ../../proxy/shared/liberror.a 
> ../../proxy/shared/libdiagsconfig.a -lresolv -ltcl8.5 -lhwloc -lm 
> ../../lib/wccp/libwccp.a ../../lib/tsconfig/.libs/libtsconfig.so -lcap -lpcre 
> -lz -lcrypt -lpthread -lrt -ldl /usr/lib/x86_64-linux-gnu/libxml2.so 
> -Wl,-rpath -Wl,/usr/lib/trafficserver
> /usr/bin/ld: ../../lib/wccp/libwccp.a(WccpMsg.o): undefined reference to 
> symbol 'MD5_Final@@OPENSSL_1.0.0'
> /usr/bin/ld: note: 'MD5_Final@@OPENSSL_1.0.0' is defined in DSO 
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so so 
> try adding it to the linker command line
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so: 
> could not read symbols: Invalid operation
> collect2: ld returned 1 exit status
> make[3]: *** [traffic_manager] Error 1
> make[3]: Leaving directory `/«PKGBUILDDIR»/cmd/traffic_manager'
> make[2]: *** [all-recursive] Error 1
> make[2]: Leaving directory `/«PKGBUILDDIR»/cmd'
> make[1]: *** [all-recursive] Error 1
> make[1]: Leaving directory `/«PKGBUILDDIR»'
> dh_auto_build: make -j1 returned exit code 2
> make: *** [binary-arch] Error 2
> {code}
> [1] 
> https://wiki.debian.org/ToolChain/DSOLinking#Only_link_with_needed_libraries
> [2] https://wiki.ubuntu.com/NattyNarwhal/ToolchainTransition



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3632) libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3632?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3632:

Backport to Version:   (was: 5.3.1)

> libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final
> -
>
> Key: TS-3632
> URL: https://issues.apache.org/jira/browse/TS-3632
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Build
>Affects Versions: 5.3.0
>Reporter: Igor Galić
>Assignee: Jean Baptiste Favre
> Fix For: 5.3.1, 6.0.0
>
>
> When building ATS 5.3.0 on Ubuntu >11.04[1,2] a linking failure occurs 
> because of the ordering of the libraries:
> {code}
> libtool: link: c++ -g -O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 
> -Wformat -Wformat-security -Werror=format-security -pipe -Wall 
> -feliminate-unused-debug-symbols -fno-strict-aliasing -Wno-invalid-offsetof 
> -mcx16 -rdynamic -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z -Wl,relro -Wl,-z 
> -Wl,now -o .libs/traffic_manager AddConfigFilesHere.o traffic_manager.o 
> StatProcessor.o StatType.o StatXML.o  ../../mgmt/web2/libweb.a 
> ../../mgmt/api/.libs/libmgmtapilocal.a 
> /«PKGBUILDDIR»/lib/ts/.libs/libtsutil.so -lssl -lcrypto -L/usr/lib 
> ../../mgmt/.libs/libmgmt_lm.a ../../proxy/hdrs/libhdrs.a 
> ../../lib/records/librecords_lm.a ../../lib/ts/.libs/libtsutil.so 
> ../../iocore/eventsystem/libinkevent.a ../../proxy/shared/liberror.a 
> ../../proxy/shared/libdiagsconfig.a -lresolv -ltcl8.5 -lhwloc -lm 
> ../../lib/wccp/libwccp.a ../../lib/tsconfig/.libs/libtsconfig.so -lcap -lpcre 
> -lz -lcrypt -lpthread -lrt -ldl /usr/lib/x86_64-linux-gnu/libxml2.so 
> -Wl,-rpath -Wl,/usr/lib/trafficserver
> /usr/bin/ld: ../../lib/wccp/libwccp.a(WccpMsg.o): undefined reference to 
> symbol 'MD5_Final@@OPENSSL_1.0.0'
> /usr/bin/ld: note: 'MD5_Final@@OPENSSL_1.0.0' is defined in DSO 
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so so 
> try adding it to the linker command line
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so: 
> could not read symbols: Invalid operation
> collect2: ld returned 1 exit status
> make[3]: *** [traffic_manager] Error 1
> make[3]: Leaving directory `/«PKGBUILDDIR»/cmd/traffic_manager'
> make[2]: *** [all-recursive] Error 1
> make[2]: Leaving directory `/«PKGBUILDDIR»/cmd'
> make[1]: *** [all-recursive] Error 1
> make[1]: Leaving directory `/«PKGBUILDDIR»'
> dh_auto_build: make -j1 returned exit code 2
> make: *** [binary-arch] Error 2
> {code}
> [1] 
> https://wiki.debian.org/ToolChain/DSOLinking#Only_link_with_needed_libraries
> [2] https://wiki.ubuntu.com/NattyNarwhal/ToolchainTransition



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3632) libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3632?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568464#comment-14568464
 ] 

ASF subversion and git services commented on TS-3632:
-

Commit b2651964fd083237e8c505c4d0d603852c339f64 in trafficserver's branch 
refs/heads/master from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=b265196 ]

TS-3632: Add to CHANGES


> libwccp.a(WccpMsg.o): undefined reference to symbol MD5_Final
> -
>
> Key: TS-3632
> URL: https://issues.apache.org/jira/browse/TS-3632
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Build
>Affects Versions: 5.3.0
>Reporter: Igor Galić
>Assignee: Jean Baptiste Favre
> Fix For: 6.0.0
>
>
> When building ATS 5.3.0 on Ubuntu >11.04[1,2] a linking failure occurs 
> because of the ordering of the libraries:
> {code}
> libtool: link: c++ -g -O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 
> -Wformat -Wformat-security -Werror=format-security -pipe -Wall 
> -feliminate-unused-debug-symbols -fno-strict-aliasing -Wno-invalid-offsetof 
> -mcx16 -rdynamic -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z -Wl,relro -Wl,-z 
> -Wl,now -o .libs/traffic_manager AddConfigFilesHere.o traffic_manager.o 
> StatProcessor.o StatType.o StatXML.o  ../../mgmt/web2/libweb.a 
> ../../mgmt/api/.libs/libmgmtapilocal.a 
> /«PKGBUILDDIR»/lib/ts/.libs/libtsutil.so -lssl -lcrypto -L/usr/lib 
> ../../mgmt/.libs/libmgmt_lm.a ../../proxy/hdrs/libhdrs.a 
> ../../lib/records/librecords_lm.a ../../lib/ts/.libs/libtsutil.so 
> ../../iocore/eventsystem/libinkevent.a ../../proxy/shared/liberror.a 
> ../../proxy/shared/libdiagsconfig.a -lresolv -ltcl8.5 -lhwloc -lm 
> ../../lib/wccp/libwccp.a ../../lib/tsconfig/.libs/libtsconfig.so -lcap -lpcre 
> -lz -lcrypt -lpthread -lrt -ldl /usr/lib/x86_64-linux-gnu/libxml2.so 
> -Wl,-rpath -Wl,/usr/lib/trafficserver
> /usr/bin/ld: ../../lib/wccp/libwccp.a(WccpMsg.o): undefined reference to 
> symbol 'MD5_Final@@OPENSSL_1.0.0'
> /usr/bin/ld: note: 'MD5_Final@@OPENSSL_1.0.0' is defined in DSO 
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so so 
> try adding it to the linker command line
> /usr/lib/gcc/x86_64-linux-gnu/4.6/../../../x86_64-linux-gnu/libcrypto.so: 
> could not read symbols: Invalid operation
> collect2: ld returned 1 exit status
> make[3]: *** [traffic_manager] Error 1
> make[3]: Leaving directory `/«PKGBUILDDIR»/cmd/traffic_manager'
> make[2]: *** [all-recursive] Error 1
> make[2]: Leaving directory `/«PKGBUILDDIR»/cmd'
> make[1]: *** [all-recursive] Error 1
> make[1]: Leaving directory `/«PKGBUILDDIR»'
> dh_auto_build: make -j1 returned exit code 2
> make: *** [binary-arch] Error 2
> {code}
> [1] 
> https://wiki.debian.org/ToolChain/DSOLinking#Only_link_with_needed_libraries
> [2] https://wiki.ubuntu.com/NattyNarwhal/ToolchainTransition



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3597) TLS can fail accept / handshake since commit 2a8bb593fd

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3597?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3597:

Fix Version/s: 5.3.1

> TLS can fail accept / handshake since commit 2a8bb593fd
> ---
>
> Key: TS-3597
> URL: https://issues.apache.org/jira/browse/TS-3597
> Project: Traffic Server
>  Issue Type: Bug
>  Components: SSL
>Reporter: Leif Hedstrom
>Assignee: Susan Hinrichs
>Priority: Critical
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3597.diff
>
>
> At least under certain conditions (slightly unclear,but possible a race with 
> multiple NUMA nodes), we fail to accept / TLS handshake. I've tracked this 
> down to the commit from 2a8bb593fdd7ca9125efad76e27f3f17f5bca794.
> The commit prior to this does not expose the problem. [~gancho] also 
> discovered that this problem is only triggered when accept thread is off (0).
> Also from [~gancho], when this reproduces, a command like e.g. this will fail 
> the handshake completely (no ciphers):
> {code}
> openssl s_client -connect 10.1.2.3:443 -tls1 -servername some.host.com
> {code}
> Also, since this only happens with accept thread off (0), which implies 
> accept on every ET_NET thread, maybe there's some sort of race condition 
> going on here? That's just a wild speculation though.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3597) TLS can fail accept / handshake since commit 2a8bb593fd

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3597?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3597:

Backport to Version:   (was: 5.3.1)

> TLS can fail accept / handshake since commit 2a8bb593fd
> ---
>
> Key: TS-3597
> URL: https://issues.apache.org/jira/browse/TS-3597
> Project: Traffic Server
>  Issue Type: Bug
>  Components: SSL
>Reporter: Leif Hedstrom
>Assignee: Susan Hinrichs
>Priority: Critical
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3597.diff
>
>
> At least under certain conditions (slightly unclear,but possible a race with 
> multiple NUMA nodes), we fail to accept / TLS handshake. I've tracked this 
> down to the commit from 2a8bb593fdd7ca9125efad76e27f3f17f5bca794.
> The commit prior to this does not expose the problem. [~gancho] also 
> discovered that this problem is only triggered when accept thread is off (0).
> Also from [~gancho], when this reproduces, a command like e.g. this will fail 
> the handshake completely (no ciphers):
> {code}
> openssl s_client -connect 10.1.2.3:443 -tls1 -servername some.host.com
> {code}
> Also, since this only happens with accept thread off (0), which implies 
> accept on every ET_NET thread, maybe there's some sort of race condition 
> going on here? That's just a wild speculation though.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3603) Debug Assert occurs in UnixNetVConnection::set_enabled when accept_threads are disabled

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3603?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3603:

Backport to Version:   (was: 5.3.1)

> Debug Assert occurs in UnixNetVConnection::set_enabled when accept_threads 
> are disabled
> ---
>
> Key: TS-3603
> URL: https://issues.apache.org/jira/browse/TS-3603
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Network
>Reporter: Susan Hinrichs
>Assignee: Susan Hinrichs
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3603.diff
>
>
> This was found while tracking down TS-3597.  The assert stack is in a comment 
> on that bug.
> When you don't have a dedicated assert thread, the mutex is not locked before 
> going into the do_io_read to process the accept event.  In the dedicated 
> thread case, you end up exercising UnixNetVConnection::acceptEvent which does 
> grab the mutex.
> May be a relatively harmless error.  Since this is a newly created VC, there 
> should be no race conditions on it.  But violating locking assumptions seem 
> like a really bad idea.  Especially since grabbing a lock on a supposedly 
> uncontended object should be cheap.
> A 5.3.x patch is attached to this bug which solves the problem on my build.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3603) Debug Assert occurs in UnixNetVConnection::set_enabled when accept_threads are disabled

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3603?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3603:

Fix Version/s: 6.0.0
   5.3.1

> Debug Assert occurs in UnixNetVConnection::set_enabled when accept_threads 
> are disabled
> ---
>
> Key: TS-3603
> URL: https://issues.apache.org/jira/browse/TS-3603
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Network
>Reporter: Susan Hinrichs
>Assignee: Susan Hinrichs
> Fix For: 5.3.1, 6.0.0
>
> Attachments: TS-3603.diff
>
>
> This was found while tracking down TS-3597.  The assert stack is in a comment 
> on that bug.
> When you don't have a dedicated assert thread, the mutex is not locked before 
> going into the do_io_read to process the accept event.  In the dedicated 
> thread case, you end up exercising UnixNetVConnection::acceptEvent which does 
> grab the mutex.
> May be a relatively harmless error.  Since this is a newly created VC, there 
> should be no race conditions on it.  But violating locking assumptions seem 
> like a really bad idea.  Especially since grabbing a lock on a supposedly 
> uncontended object should be cheap.
> A 5.3.x patch is attached to this bug which solves the problem on my build.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3600) Missing break; statement in background_fetch plugin

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3600?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3600:

Fix Version/s: 5.3.1

> Missing break; statement in background_fetch plugin
> ---
>
> Key: TS-3600
> URL: https://issues.apache.org/jira/browse/TS-3600
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Leif Hedstrom
>Assignee: Leif Hedstrom
> Fix For: 5.3.1, 6.0.0
>
>
> This causes us to fall through in an undesirable way. Somehow, it still seems 
> to work, but is clearly wrong.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3600) Missing break; statement in background_fetch plugin

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3600?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3600:

Backport to Version:   (was: 5.3.1)

> Missing break; statement in background_fetch plugin
> ---
>
> Key: TS-3600
> URL: https://issues.apache.org/jira/browse/TS-3600
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Leif Hedstrom
>Assignee: Leif Hedstrom
> Fix For: 5.3.1, 6.0.0
>
>
> This causes us to fall through in an undesirable way. Somehow, it still seems 
> to work, but is clearly wrong.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3590) H2 fetch streams marked as internal requests incorrectly

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3590?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3590:

Fix Version/s: 6.0.0
   5.3.1

> H2 fetch streams marked as internal requests incorrectly
> 
>
> Key: TS-3590
> URL: https://issues.apache.org/jira/browse/TS-3590
> Project: Traffic Server
>  Issue Type: Bug
>  Components: HTTP/2
>Reporter: Sudheer Vinukonda
> Fix For: 5.3.1, 6.0.0
>
>
> A bug similar to TS-2906



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3590) H2 fetch streams marked as internal requests incorrectly

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3590?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3590:

Backport to Version:   (was: 5.3.1)

> H2 fetch streams marked as internal requests incorrectly
> 
>
> Key: TS-3590
> URL: https://issues.apache.org/jira/browse/TS-3590
> Project: Traffic Server
>  Issue Type: Bug
>  Components: HTTP/2
>Reporter: Sudheer Vinukonda
> Fix For: 5.3.1, 6.0.0
>
>
> A bug similar to TS-2906



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3590) H2 fetch streams marked as internal requests incorrectly

2015-06-01 Thread Phil Sorber (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3590?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568447#comment-14568447
 ] 

Phil Sorber commented on TS-3590:
-

Commit 372e03077 is for backport as well.

> H2 fetch streams marked as internal requests incorrectly
> 
>
> Key: TS-3590
> URL: https://issues.apache.org/jira/browse/TS-3590
> Project: Traffic Server
>  Issue Type: Bug
>  Components: HTTP/2
>Reporter: Sudheer Vinukonda
>
> A bug similar to TS-2906



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3504) Enabling proxy.config.cache.ram_cache.use_seen_filter and reloading the config dynamically causes traffic_server to core in the ram cache code

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3504?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3504:

Backport to Version:   (was: 5.3.1)

> Enabling proxy.config.cache.ram_cache.use_seen_filter and reloading the 
> config dynamically causes traffic_server to core in the ram cache code
> --
>
> Key: TS-3504
> URL: https://issues.apache.org/jira/browse/TS-3504
> Project: Traffic Server
>  Issue Type: Bug
>Affects Versions: 5.2.0
>Reporter: Phil Sorber
>Assignee: Phil Sorber
> Fix For: 5.3.1, 6.0.0
>
>
> Enabling proxy.config.cache.ram_cache.use_seen_filter and reloading the 
> config dynamically causes traffic_server to core in the ram cache code. 
> RECU_RESTART_TS is not enforced and the internal variable is initialized with 
> a callback. The `seen` array is only allocated in the resize_table method 
> which is called from init so it works for a restart but not on a traffic_line 
> -x reload.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3504) Enabling proxy.config.cache.ram_cache.use_seen_filter and reloading the config dynamically causes traffic_server to core in the ram cache code

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3504?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3504:

Fix Version/s: 5.3.1

> Enabling proxy.config.cache.ram_cache.use_seen_filter and reloading the 
> config dynamically causes traffic_server to core in the ram cache code
> --
>
> Key: TS-3504
> URL: https://issues.apache.org/jira/browse/TS-3504
> Project: Traffic Server
>  Issue Type: Bug
>Affects Versions: 5.2.0
>Reporter: Phil Sorber
>Assignee: Phil Sorber
> Fix For: 5.3.1, 6.0.0
>
>
> Enabling proxy.config.cache.ram_cache.use_seen_filter and reloading the 
> config dynamically causes traffic_server to core in the ram cache code. 
> RECU_RESTART_TS is not enforced and the internal variable is initialized with 
> a callback. The `seen` array is only allocated in the resize_table method 
> which is called from init so it works for a restart but not on a traffic_line 
> -x reload.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3652) During 3xx redirect follow, TS uses the redirect url as the cache key ignoring any cache key set via API

2015-06-01 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3652?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3652:
--
Description: 
Currently, during 3xx redirect follow, TS uses the redirect url (as received in 
the *Location* header of the 3xx response) as the cache key for storing the 
subsequent response to the redirect follow request. This works fine in most 
cases, since, the original client request would have cached the 3xx response 
and the final response would still be derived using the redirect follow url. 
This also allows direct requests to the redirect follow location be served from 
the cache efficiently.

However, this is not desirable in some cases, especially when there's a TS API 
(plugin) modifying the cache key and wanting to store the final response 
against the modified cache key directly. 

Proposing to add a config setting to allow storing API set cache key during 
redirect follow.

  was:
Currently, during 3xx redirect follow, TS uses the redirect url (as received in 
the *Location* header of the 3xx response) as the cache key for storing the 
subsequent response to the redirect follow request). This works fine in most 
cases, since, the original client request would have cached the 3xx response 
and the final response would still be derived using the redirect follow url. 
This also allows direct requests to the redirect follow location be served from 
the cache efficiently.

However, this is not desirable in some cases, especially when there's a TS API 
(plugin) modifying the cache key and wanting to store the final response 
against the modified cache key directly. 

Proposing to add a config setting to allow storing API set cache key during 
redirect follow.


> During 3xx redirect follow, TS uses the redirect url as the cache key 
> ignoring any cache key set via API
> 
>
> Key: TS-3652
> URL: https://issues.apache.org/jira/browse/TS-3652
> Project: Traffic Server
>  Issue Type: Bug
>  Components: HTTP
>Reporter: Sudheer Vinukonda
>
> Currently, during 3xx redirect follow, TS uses the redirect url (as received 
> in the *Location* header of the 3xx response) as the cache key for storing 
> the subsequent response to the redirect follow request. This works fine in 
> most cases, since, the original client request would have cached the 3xx 
> response and the final response would still be derived using the redirect 
> follow url. This also allows direct requests to the redirect follow location 
> be served from the cache efficiently.
> However, this is not desirable in some cases, especially when there's a TS 
> API (plugin) modifying the cache key and wanting to store the final response 
> against the modified cache key directly. 
> Proposing to add a config setting to allow storing API set cache key during 
> redirect follow.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3652) During 3xx redirect follow, TS uses the redirect url as the cache key ignoring any cache key set via API

2015-06-01 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3652?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3652:
--
Issue Type: Bug  (was: Improvement)

> During 3xx redirect follow, TS uses the redirect url as the cache key 
> ignoring any cache key set via API
> 
>
> Key: TS-3652
> URL: https://issues.apache.org/jira/browse/TS-3652
> Project: Traffic Server
>  Issue Type: Bug
>  Components: HTTP
>Reporter: Sudheer Vinukonda
>
> Currently, during 3xx redirect follow, TS uses the redirect url (as received 
> in the *Location* header of the 3xx response) as the cache key for storing 
> the subsequent response to the redirect follow request). This works fine in 
> most cases, since, the original client request would have cached the 3xx 
> response and the final response would still be derived using the redirect 
> follow url. This also allows direct requests to the redirect follow location 
> be served from the cache efficiently.
> However, this is not desirable in some cases, especially when there's a TS 
> API (plugin) modifying the cache key and wanting to store the final response 
> against the modified cache key directly. 
> Proposing to add a config setting to allow storing API set cache key during 
> redirect follow.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3652) During 3xx redirect follow, TS uses the redirect url as the cache key ignoring any cache key set via API

2015-06-01 Thread Sudheer Vinukonda (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3652?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568404#comment-14568404
 ] 

Sudheer Vinukonda commented on TS-3652:
---

Discussed with [~zwoop] and it seems to us that, this behavior is actually a 
bug to not honor the API set cache lookup key, so we will just fix this without 
a config setting.

> During 3xx redirect follow, TS uses the redirect url as the cache key 
> ignoring any cache key set via API
> 
>
> Key: TS-3652
> URL: https://issues.apache.org/jira/browse/TS-3652
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: HTTP
>Reporter: Sudheer Vinukonda
>
> Currently, during 3xx redirect follow, TS uses the redirect url (as received 
> in the *Location* header of the 3xx response) as the cache key for storing 
> the subsequent response to the redirect follow request). This works fine in 
> most cases, since, the original client request would have cached the 3xx 
> response and the final response would still be derived using the redirect 
> follow url. This also allows direct requests to the redirect follow location 
> be served from the cache efficiently.
> However, this is not desirable in some cases, especially when there's a TS 
> API (plugin) modifying the cache key and wanting to store the final response 
> against the modified cache key directly. 
> Proposing to add a config setting to allow storing API set cache key during 
> redirect follow.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (TS-3652) During 3xx redirect follow, TS uses the redirect url as the cache key ignoring any cache key set via API

2015-06-01 Thread Sudheer Vinukonda (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3652?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568404#comment-14568404
 ] 

Sudheer Vinukonda edited comment on TS-3652 at 6/2/15 2:22 AM:
---

Discussed with [~zwoop] and it seems to us that, this behavior is actually a 
bug to not honor the API set cache lookup key, so we will just fix this without 
a config setting. Will send out an email to dev@ asking for feedback.


was (Author: sudheerv):
Discussed with [~zwoop] and it seems to us that, this behavior is actually a 
bug to not honor the API set cache lookup key, so we will just fix this without 
a config setting.

> During 3xx redirect follow, TS uses the redirect url as the cache key 
> ignoring any cache key set via API
> 
>
> Key: TS-3652
> URL: https://issues.apache.org/jira/browse/TS-3652
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: HTTP
>Reporter: Sudheer Vinukonda
>
> Currently, during 3xx redirect follow, TS uses the redirect url (as received 
> in the *Location* header of the 3xx response) as the cache key for storing 
> the subsequent response to the redirect follow request). This works fine in 
> most cases, since, the original client request would have cached the 3xx 
> response and the final response would still be derived using the redirect 
> follow url. This also allows direct requests to the redirect follow location 
> be served from the cache efficiently.
> However, this is not desirable in some cases, especially when there's a TS 
> API (plugin) modifying the cache key and wanting to store the final response 
> against the modified cache key directly. 
> Proposing to add a config setting to allow storing API set cache key during 
> redirect follow.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3654) ASAN heap-use-after-free in cache-hosting (regression)

2015-06-01 Thread Leif Hedstrom (JIRA)
Leif Hedstrom created TS-3654:
-

 Summary: ASAN heap-use-after-free in cache-hosting (regression)
 Key: TS-3654
 URL: https://issues.apache.org/jira/browse/TS-3654
 Project: Traffic Server
  Issue Type: Improvement
  Components: Cache
Reporter: Leif Hedstrom


{code}
RPRINT Cache_vol: 1 128 Megabyte Volumes
RPRINT Cache_vol: Not enough space for 10 volume
RPRINT Cache_vol: Random Volumes after clearing the disks
RPRINT Cache_vol: volume=1 scheme=http size=128
RPRINT Cache_vol: Random Volumes without clearing the disks
RPRINT Cache_vol: volume=1 scheme=rtsp size=128
=
==3733==ERROR: AddressSanitizer: heap-use-after-free on address 0x604a2960 
at pc 0xa7ce83 bp 0x7f3c7f946980 sp 0x7f3c7f946970
READ of size 8 at 0x604a2960 thread T3 ([ET_NET 2])
#0 0xa7ce82 in cplist_update ../../../../iocore/cache/Cache.cc:3230
#1 0xa7ce82 in cplist_reconfigure() ../../../../iocore/cache/Cache.cc:3374
#2 0xac619e in execute_and_verify(RegressionTest*) 
../../../../iocore/cache/CacheHosting.cc:994
#3 0xac75f8 in RegressionTest_Cache_vol(RegressionTest*, int, int*) 
../../../../iocore/cache/CacheHosting.cc:840
#4 0x7f3c8480b4d2 in start_test ../../../../lib/ts/Regression.cc:77
#5 0x7f3c8480b4d2 in RegressionTest::run_some() 
../../../../lib/ts/Regression.cc:125
#6 0x7f3c8480b9b6 in RegressionTest::check_status() 
../../../../lib/ts/Regression.cc:140
#7 0x57b5b4 in RegressionCont::mainEvent(int, Event*) 
../../../proxy/Main.cc:1220
#8 0xc8b86e in Continuation::handleEvent(int, void*) 
../../../../iocore/eventsystem/I_Continuation.h:145
#9 0xc8b86e in EThread::process_event(Event*, int) 
../../../../iocore/eventsystem/UnixEThread.cc:128
#10 0xc8da67 in EThread::execute() 
../../../../iocore/eventsystem/UnixEThread.cc:207
#11 0xc8a488 in spawn_thread_internal 
../../../../iocore/eventsystem/Thread.cc:85
#12 0x7f3c84392529 in start_thread (/lib64/libpthread.so.0+0x3813e07529)
#13 0x381370022c in __clone (/lib64/libc.so.6+0x381370022c)

0x604a2960 is located 16 bytes inside of 40-byte region 
[0x604a2950,0x604a2978)
freed by thread T3 ([ET_NET 2]) here:
#0 0x7f3c84aaf64f in operator delete(void*) (/lib64/libasan.so.1+0x5864f)
#1 0xabbd16 in CacheDisk::delete_volume(int) 
../../../../iocore/cache/CacheDisk.cc:330
#2 0xa7bfe0 in cplist_update ../../../../iocore/cache/Cache.cc:3212
#3 0xa7bfe0 in cplist_reconfigure() ../../../../iocore/cache/Cache.cc:3374
#4 0xac619e in execute_and_verify(RegressionTest*) 
../../../../iocore/cache/CacheHosting.cc:994
#5 0xac75f8 in RegressionTest_Cache_vol(RegressionTest*, int, int*) 
../../../../iocore/cache/CacheHosting.cc:840
#6 0x7f3c8480b4d2 in start_test ../../../../lib/ts/Regression.cc:77
#7 0x7f3c8480b4d2 in RegressionTest::run_some() 
../../../../lib/ts/Regression.cc:125
#8 0x7f3c8480b9b6 in RegressionTest::check_status() 
../../../../lib/ts/Regression.cc:140
#9 0x57b5b4 in RegressionCont::mainEvent(int, Event*) 
../../../proxy/Main.cc:1220
#10 0xc8b86e in Continuation::handleEvent(int, void*) 
../../../../iocore/eventsystem/I_Continuation.h:145
#11 0xc8b86e in EThread::process_event(Event*, int) 
../../../../iocore/eventsystem/UnixEThread.cc:128
#12 0xc8da67 in EThread::execute() 
../../../../iocore/eventsystem/UnixEThread.cc:207
#13 0xc8a488 in spawn_thread_internal 
../../../../iocore/eventsystem/Thread.cc:85
#14 0x7f3c84392529 in start_thread (/lib64/libpthread.so.0+0x3813e07529)

previously allocated by thread T3 ([ET_NET 2]) here:
#0 0x7f3c84aaf14f in operator new(unsigned long) 
(/lib64/libasan.so.1+0x5814f)
#1 0xaba5ca in CacheDisk::create_volume(int, long, int) 
../../../../iocore/cache/CacheDisk.cc:296
#2 0xa74f81 in create_volume ../../../../iocore/cache/Cache.cc:3551
#3 0xa7ca20 in cplist_reconfigure() ../../../../iocore/cache/Cache.cc:3405
#4 0xac619e in execute_and_verify(RegressionTest*) 
../../../../iocore/cache/CacheHosting.cc:994
#5 0xac75f8 in RegressionTest_Cache_vol(RegressionTest*, int, int*) 
../../../../iocore/cache/CacheHosting.cc:840
#6 0x7f3c8480b4d2 in start_test ../../../../lib/ts/Regression.cc:77
#7 0x7f3c8480b4d2 in RegressionTest::run_some() 
../../../../lib/ts/Regression.cc:125
#8 0x7f3c8480b9b6 in RegressionTest::check_status() 
../../../../lib/ts/Regression.cc:140
#9 0x57b5b4 in RegressionCont::mainEvent(int, Event*) 
../../../proxy/Main.cc:1220
#10 0xc8b86e in Continuation::handleEvent(int, void*) 
../../../../iocore/eventsystem/I_Continuation.h:145
#11 0xc8b86e in EThread::process_event(Event*, int) 
../../../../iocore/eventsystem/UnixEThread.cc:128
#12 0xc8da67 in EThread::execute() 
../../../../iocore/eventsystem/UnixEThread.cc:207
#13 0xc8a488 in spawn_thread_internal 
../../../../iocore

[jira] [Resolved] (TS-3653) Add the ability to exclude by regex to url_sig plugin

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber resolved TS-3653.
-
Resolution: Implemented

> Add the ability to exclude by regex to url_sig plugin
> -
>
> Key: TS-3653
> URL: https://issues.apache.org/jira/browse/TS-3653
> Project: Traffic Server
>  Issue Type: New Feature
>Reporter: Phil Sorber
>Assignee: Phil Sorber
> Fix For: 6.0.0
>
>
> Allow certain url's to be excluded from authentication by regular expression.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3653) Add the ability to exclude by regex to url_sig plugin

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3653?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568124#comment-14568124
 ] 

ASF subversion and git services commented on TS-3653:
-

Commit 9cafcee69387692b803ca5be292288ae0dc04639 in trafficserver's branch 
refs/heads/master from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=9cafcee ]

TS-3653: Add the ability to exclude by regex to url_sig plugin


> Add the ability to exclude by regex to url_sig plugin
> -
>
> Key: TS-3653
> URL: https://issues.apache.org/jira/browse/TS-3653
> Project: Traffic Server
>  Issue Type: New Feature
>Reporter: Phil Sorber
>Assignee: Phil Sorber
> Fix For: 6.0.0
>
>
> Allow certain url's to be excluded from authentication by regular expression.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3653) Add the ability to exclude by regex to url_sig plugin

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3653:

Fix Version/s: 6.0.0

> Add the ability to exclude by regex to url_sig plugin
> -
>
> Key: TS-3653
> URL: https://issues.apache.org/jira/browse/TS-3653
> Project: Traffic Server
>  Issue Type: New Feature
>Reporter: Phil Sorber
> Fix For: 6.0.0
>
>
> Allow certain url's to be excluded from authentication by regular expression.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3653) Add the ability to exclude by regex to url_sig plugin

2015-06-01 Thread Phil Sorber (JIRA)
Phil Sorber created TS-3653:
---

 Summary: Add the ability to exclude by regex to url_sig plugin
 Key: TS-3653
 URL: https://issues.apache.org/jira/browse/TS-3653
 Project: Traffic Server
  Issue Type: New Feature
Reporter: Phil Sorber


Allow certain url's to be excluded from authentication by regular expression.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (TS-3653) Add the ability to exclude by regex to url_sig plugin

2015-06-01 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber reassigned TS-3653:
---

Assignee: Phil Sorber

> Add the ability to exclude by regex to url_sig plugin
> -
>
> Key: TS-3653
> URL: https://issues.apache.org/jira/browse/TS-3653
> Project: Traffic Server
>  Issue Type: New Feature
>Reporter: Phil Sorber
>Assignee: Phil Sorber
> Fix For: 6.0.0
>
>
> Allow certain url's to be excluded from authentication by regular expression.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568040#comment-14568040
 ] 

ASF subversion and git services commented on TS-3649:
-

Commit 7cae891870a5634dd28f2a679ff3b4f9a9fbe82b in trafficserver's branch 
refs/heads/master from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=7cae891 ]

TS-3649: Check key length during config parse


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3652) During 3xx redirect follow, TS uses the redirect url as the cache key ignoring any cache key set via API

2015-06-01 Thread Sudheer Vinukonda (JIRA)
Sudheer Vinukonda created TS-3652:
-

 Summary: During 3xx redirect follow, TS uses the redirect url as 
the cache key ignoring any cache key set via API
 Key: TS-3652
 URL: https://issues.apache.org/jira/browse/TS-3652
 Project: Traffic Server
  Issue Type: Improvement
  Components: HTTP
Reporter: Sudheer Vinukonda


Currently, during 3xx redirect follow, TS uses the redirect url (as received in 
the *Location* header of the 3xx response) as the cache key for storing the 
subsequent response to the redirect follow request). This works fine in most 
cases, since, the original client request would have cached the 3xx response 
and the final response would still be derived using the redirect follow url. 
This also allows direct requests to the redirect follow location be served from 
the cache efficiently.

However, this is not desirable in some cases, especially when there's a TS API 
(plugin) modifying the cache key and wanting to store the final response 
against the modified cache key directly. 

Proposing to add a config setting to allow storing API set cache key during 
redirect follow.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3649:
--
Backport to Version: 5.3.1

> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567840#comment-14567840
 ] 

ASF GitHub Bot commented on TS-3649:


Github user asfgit closed the pull request at:

https://github.com/apache/trafficserver/pull/208


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567839#comment-14567839
 ] 

ASF subversion and git services commented on TS-3649:
-

Commit 133df337c682ca2ae76a983bfbdea51e2f2ffc82 in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=133df33 ]

Added TS-3649.

This closes #208


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567837#comment-14567837
 ] 

ASF subversion and git services commented on TS-3649:
-

Commit 3f523ea5db49e244f9a09b4752d06031e3f31130 in trafficserver's branch 
refs/heads/master from [~gancho]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=3f523ea ]

TS-3649 Fix for url_sig plugin security issues (crash by HTTP request, 
circumvent signature).


> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3650) Configuration variables should track their source

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567736#comment-14567736
 ] 

ASF GitHub Bot commented on TS-3650:


Github user jpeach commented on the pull request:

https://github.com/apache/trafficserver/pull/206#issuecomment-107664507
  
There's no way to know whether a metric was set by ``traffic_line``. The 
best you can do is to say whether a metric was set by a specific API, but 
that's complex and low value IMHO, and as you pointed out above, that 
information is lost when the configuration is persisted.


> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3650) Configuration variables should track their source

2015-06-01 Thread Sudheer Vinukonda (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567674#comment-14567674
 ] 

Sudheer Vinukonda commented on TS-3650:
---

Perhaps, the status *EXPLICIT* mentioned above is going to include both setting 
via traffic_line/API and config file explicitly?

If that's the case, then the information is no longer very useful - Fwiw, I 
liked [~jpe...@apache.org]'s suggestion on the IRC, to make use of the fact 
that a missing entry in records.config may be used to identify if a config is 
explicitly set (if/where it's really necessary)

> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3650) Configuration variables should track their source

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567651#comment-14567651
 ] 

ASF GitHub Bot commented on TS-3650:


Github user sudheerv commented on the pull request:

https://github.com/apache/trafficserver/pull/206#issuecomment-107653612
  
I don't think there was a consensus yet (at least, not from my side). 
AFAIK, my question above on persisting the source as traffic_line was not 
addressed and without making that information consistent, I am -1 on this PR.


> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567633#comment-14567633
 ] 

ASF GitHub Bot commented on TS-3649:


GitHub user gtenev opened a pull request:

https://github.com/apache/trafficserver/pull/208

TS-3649 Fix for url_sig plugin security issues 

(crash by HTTP request & circumvent signature).

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/gtenev/trafficserver TS-3649_url_sig_fix

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/trafficserver/pull/208.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #208


commit 81e2574e1007db136e0572ba438e08ecd3b7f037
Author: Gancho Tenev 
Date:   2015-06-01T17:17:40Z

TS-3649 Fix for url_sig plugin security issues (crash by HTTP request, 
circumvent signature).




> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3560) Make proxy.config.http.slow.log.threshold overridable

2015-06-01 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3560?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567612#comment-14567612
 ] 

ASF subversion and git services commented on TS-3560:
-

Commit 72d6733aa9bf39c928ede2b02761328711ce31fe in trafficserver's branch 
refs/heads/master from [~persiaAziz]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=72d6733 ]

TS-3560: Fix regression tests


> Make proxy.config.http.slow.log.threshold overridable
> -
>
> Key: TS-3560
> URL: https://issues.apache.org/jira/browse/TS-3560
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: David Carlin
>Assignee: Syeda Persia Aziz
> Fix For: 6.0.0
>
>
> Please make proxy.config.http.slow.log.threshold configurable via conf_remap 
> - we want to be able to enable it on a per-remap basis.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3650) Configuration variables should track their source

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567579#comment-14567579
 ] 

ASF GitHub Bot commented on TS-3650:


Github user jpeach commented on the pull request:

https://github.com/apache/trafficserver/pull/206#issuecomment-107638604
  
Yes, I had the same conflict about ``RECS`` ;)


> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3650) Configuration variables should track their source

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567578#comment-14567578
 ] 

ASF GitHub Bot commented on TS-3650:


Github user SolidWallOfCode commented on the pull request:

https://github.com/apache/trafficserver/pull/206#issuecomment-107638211
  
The chat concensus seemed to be to change this to NULL, DEFAULT, EXPLICIT, 
ENV. I'll change "SRC" to "SOURCE" as well - I was tempted to have "RECS" which 
would be more consistent with the other REC values but that seemed even worse 
scanning.


> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3649) url_sig plugin security issues (crash by HTTP request, circumvent signature)

2015-06-01 Thread Gancho Tenev (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3649?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gancho Tenev updated TS-3649:
-
Attachment: TS-3649-url_sig-security_issues.patch

Please find the patch attached: TS-3649-url_sig-security_issues.patch

> url_sig plugin security issues (crash by HTTP request, circumvent signature)
> 
>
> Key: TS-3649
> URL: https://issues.apache.org/jira/browse/TS-3649
> Project: Traffic Server
>  Issue Type: Bug
>  Components: Plugins
>Reporter: Gancho Tenev
>Assignee: Gancho Tenev
> Fix For: 6.0.0
>
> Attachments: TS-3649-url_sig-security_issues.patch, 
> TS-3649-url_sig-security_issues.rtf
>
>
> While reading the code found 2 security issues url_sig code which would allow:
> - Issue 1: to crash ATS which is running the url_sig plugin by using an HTTP 
> request (segmentation fault due out-of-bounds array access) - there is a need 
> of proper sanitation of the key index input (query parameter)
> - Issue 2: to gain access to protected assets by signing the URL with an 
> empty secret key if at least one of the 16 keys is not provided in the 
> uri_sig plugin configuration. One could "scan" trying all keys 0 to 15 and 
> for the empty key the signature validation would succeed - must deny access 
> if the key specified in the signature is not defined in the plugin config 
> (empty).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3650) Configuration variables should track their source

2015-06-01 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14567535#comment-14567535
 ] 

ASF GitHub Bot commented on TS-3650:


Github user jpeach commented on the pull request:

https://github.com/apache/trafficserver/pull/206#issuecomment-107628793
  
The ``REC_SRC`` constants scan poorly, I think I'd prefer ``REC_SOURCE``. 
``REC_SRC_NONE`` should be called ``REC_SOURCE_NULL`` to be consistent with 
other naming. There's some semantic confusion about what ``REC_SRC_DEFAULT`` 
means. When ``traffic_manager`` sets variables, I don't think they should be 
considered defaults.

I am sympathetic to @sudheerv's concerns about how useful this is. The 
distinction between "hard-coded default" and "everything else" is clear, but 
this change is attempting to track various nuances that are much murkier.

Does ``DiagsConfig::RegisterDiagConfig`` really have to register 
everything? I expect that that superfluous now?


> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (TS-3650) Configuration variables should track their source

2015-06-01 Thread Alan M. Carroll (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alan M. Carroll reassigned TS-3650:
---

Assignee: Alan M. Carroll

> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>Assignee: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3651) Eliminate proxy.config.http.share_server_sessions

2015-06-01 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3651?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3651:
--
Assignee: Alan M. Carroll

> Eliminate proxy.config.http.share_server_sessions
> -
>
> Key: TS-3651
> URL: https://issues.apache.org/jira/browse/TS-3651
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Leif Hedstrom
>Assignee: Alan M. Carroll
>  Labels: Incompatible
> Fix For: 6.0.0
>
>
> We deprecated proxy.config.http.share_server_sessions in v5.x, in favor of a 
> set of more powerful configuration options. As such, it's time to remove the 
> old configuration for 6.0.0. This is inline with our normal practice of
> 1) Deprecate something in version 
> 2) Remove that something in version  + 1.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3651) Eliminate proxy.config.http.share_server_sessions

2015-06-01 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3651?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3651:
--
Fix Version/s: 6.0.0

> Eliminate proxy.config.http.share_server_sessions
> -
>
> Key: TS-3651
> URL: https://issues.apache.org/jira/browse/TS-3651
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Leif Hedstrom
>  Labels: Incompatible
> Fix For: 6.0.0
>
>
> We deprecated proxy.config.http.share_server_sessions in v5.x, in favor of a 
> set of more powerful configuration options. As such, it's time to remove the 
> old configuration for 6.0.0. This is inline with our normal practice of
> 1) Deprecate something in version 
> 2) Remove that something in version  + 1.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3651) Eliminate proxy.config.http.share_server_sessions

2015-06-01 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3651?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3651:
--
Labels: Incompatible  (was: )

> Eliminate proxy.config.http.share_server_sessions
> -
>
> Key: TS-3651
> URL: https://issues.apache.org/jira/browse/TS-3651
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Leif Hedstrom
>  Labels: Incompatible
> Fix For: 6.0.0
>
>
> We deprecated proxy.config.http.share_server_sessions in v5.x, in favor of a 
> set of more powerful configuration options. As such, it's time to remove the 
> old configuration for 6.0.0. This is inline with our normal practice of
> 1) Deprecate something in version 
> 2) Remove that something in version  + 1.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3651) Eliminate proxy.config.http.share_server_sessions

2015-06-01 Thread Leif Hedstrom (JIRA)
Leif Hedstrom created TS-3651:
-

 Summary: Eliminate proxy.config.http.share_server_sessions
 Key: TS-3651
 URL: https://issues.apache.org/jira/browse/TS-3651
 Project: Traffic Server
  Issue Type: Improvement
  Components: Configuration
Reporter: Leif Hedstrom


We deprecated proxy.config.http.share_server_sessions in v5.x, in favor of a 
set of more powerful configuration options. As such, it's time to remove the 
old configuration for 6.0.0. This is inline with our normal practice of

1) Deprecate something in version 

2) Remove that something in version  + 1.




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3650) Configuration variables should track their source

2015-06-01 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3650?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3650:
--
Description: 
 A configuration variable can get its value from a variety of sources. It would 
be useful to be able to programmatically determine that source. At a minimum 
the ability to determine if a variable was set explicitly in a configuration 
file vs. using a built in default value would be very useful.

In addition this information should be made available to the administrator via 
{{traffic_ctl}} to aid in debugging.

The proposed values are

* {{DEFAULT}} - built in default, hard wired.
* {{FILE}} - read from a configuration file.
* {{API}} - set via an API of some sort ({{traffic_line}} etc.)
* {{CLUSTER}} - set via cluster configuration
* {{ENV}} - set from an environment variable

In addition the value {{INVALID}} will be defined to use for the internal API, 
primarily as a value to return if the requested variable doesn't exist (in 
which case none of the previous values are reasonable).


  was:
A configuration variable can get its value from a variety of sources. It would 
be useful to be able to programmatically determine that source. At a minimum 
the ability to determine if a variable was set explicitly in a configuration 
file vs. using a built in default value would be very useful.

In addition this information should be made available to the administrator via 
{{traffic_ctl}} to aid in debugging.

The proposed values are

* {{DEFAULT}} - built in default, hard wired.
* {{FILE}} - read from a configuration file.
* {{API}} - set via an API of some sort ({{traffic_line}} etc.)
* {{CLUSTER}} - set via cluster configuration
* {{ENV}} - set from an environment variable

In addition the value {{INVALID}} will be defined to use for the internal API, 
primarily as a value to return if the requested variable doesn't exist (in 
which case none of the previous values are reasonable).



> Configuration variables should track their source
> -
>
> Key: TS-3650
> URL: https://issues.apache.org/jira/browse/TS-3650
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: Configuration
>Reporter: Alan M. Carroll
>
>  A configuration variable can get its value from a variety of sources. It 
> would be useful to be able to programmatically determine that source. At a 
> minimum the ability to determine if a variable was set explicitly in a 
> configuration file vs. using a built in default value would be very useful.
> In addition this information should be made available to the administrator 
> via {{traffic_ctl}} to aid in debugging.
> The proposed values are
> * {{DEFAULT}} - built in default, hard wired.
> * {{FILE}} - read from a configuration file.
> * {{API}} - set via an API of some sort ({{traffic_line}} etc.)
> * {{CLUSTER}} - set via cluster configuration
> * {{ENV}} - set from an environment variable
> In addition the value {{INVALID}} will be defined to use for the internal 
> API, primarily as a value to return if the requested variable doesn't exist 
> (in which case none of the previous values are reasonable).



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)