Re: apache2 wheezy backport

2013-09-22 Thread Arno Töll
Hi,

On 21.09.2013 23:27, Stefan Fritsch wrote:
 That would be a rather large piece of work. It would be incompatible 
 with basically all apache modules and web-app packages in wheezy, so 
 those would need backporting, too. Considering that there is still 
 plenty of work to do in jessie, I don't think a backport will happen 
 anytime soon.

I do not think this will _ever_ happen. An Apache 2.4 backport would
trigger a massive chain of reverse dependencies which need a backport,
too (we talk about 250+ packages here). This is a massive change of
Wheezy which is not conforming to backport policies.


-- 
with kind regards,
Arno Töll
IRC: daemonkeeper on Freenode/OFTC
GnuPG Key-ID: 0x9D80F36D



signature.asc
Description: OpenPGP digital signature


apache2 wheezy backport

2013-09-21 Thread Matt Taggart
Hi apache maintainers,

Could you provide a backport of jessie apache2 to wheezy-backports? I would 
like some of the newer SSL features.

Someone pointed out this HOWTO

  https://tinyurl.com/nl8965g

that is recommending people frankenstein their systems by installing jessie 
libc6 in order to install jessie apache2 on wheezy. I think a backport 
would be a much cleaner way of solving that.

(there may be some additional things in that HOWTO that would be good to 
consider for the apache2 packages, I haven't reviewed it closely to see if 
it's good advice)

If this is just a matter of rebuilding things for wheezy-backports and 
uploading and you'd like me to do that, just let know.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



-- 
To UNSUBSCRIBE, email to debian-apache-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130921204835.5eea3...@taggart.lackof.org



Re: apache2 wheezy backport

2013-09-21 Thread Stefan Fritsch
Hi Matt,

Am Samstag, 21. September 2013, 13:48:35 schrieb Matt Taggart:
 Could you provide a backport of jessie apache2 to wheezy-backports?

That would be a rather large piece of work. It would be incompatible 
with basically all apache modules and web-app packages in wheezy, so 
those would need backporting, too. Considering that there is still 
plenty of work to do in jessie, I don't think a backport will happen 
anytime soon.

 I would like some of the newer SSL features.

If you are only looking for ECC/ECDHE, you could try this patch
http://people.apache.org/~sf/ECC-2.2-v2.diff on the wheezy package. I 
think we may include it in a future wheezy point release, but I would 
like it to be aproved for upstream 2.2.x, first.

 Someone pointed out this HOWTO
 
   https://tinyurl.com/nl8965g
 
 that is recommending people frankenstein their systems by installing
 jessie libc6 in order to install jessie apache2 on wheezy. I think
 a backport would be a much cleaner way of solving that.

Updating to jessie seems like the only sane solution right now.

Cheers,
Stefan


-- 
To UNSUBSCRIBE, email to debian-apache-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1933183.ZaSZLq5pCG@k



Re: apache2 wheezy backport

2013-09-21 Thread Patrick Godschalk
Hi,

 If you are only looking for ECC/ECDHE, you could try this patch
 http://people.apache.org/~sf/ECC-2.2-v2.diff on the wheezy package. I 
 think we may include it in a future wheezy point release, but I would 
 like it to be aproved for upstream 2.2.x, first.
I got pointed to this particular thread. The patchfile you mentioned
seems okay, save for two issues.

First, the patch still has hardcoded 1024-bit DH parameters. While
offering forward secrecy, using 1k DH makes for a weaker key exchange
than using 4096-bit RSA. Personally, I'd actually argue against using
ephemeral DH exchanges with 1024 bit DH params in favour of 4k RSA
exchanges. But I am rather paranoid about this.

More importantly, the patch still uses NID_X9_62_prime256v1 which in
turn uses Dual_EC_DRBG as its pseudo-RNG. This is problematic, as there
have long been suspicions about this PRNG being not so random which have
recently surfaced again:

  https://tinyurl.com/omsx9v6

More importantly, the NIST now actively discourages use of Dual_EC_DRBG
in 800-90A:

  http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf

For this reason I'd not only strongly argue in favour of using
NID_secp521r1 for the ECDH exchange - but I'd actually argue against
using ECDHE altogether with curve P256 because of the aforementioned
issue.

A problem with this is that both changes, but especially the increased
DH pool size, also result in increased server load which may not be
desirable. This could be solved by having a configuration directive to
specify a path to a DH params file.

Lastly, I'd like to note that I do not regularly follow this list. I
apologize in advance for any conventions on this mailing list I haven't
followed.

-- 
Patrick Godschalk
arg...@argure.nl
GPG: https://argure.nl/identity/ecc14594.asc
This e-mail falls under the CC0 1.0 Universal Public Domain Dedication.




-- 
To UNSUBSCRIBE, email to debian-apache-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1379807185.20367.18.ca...@alderaan.argure.nl