Re: libnss consolidation (was: Re: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-06-09 Thread Bastien ROUCARIES
Le 10 juin 2013 07:06, "Florian Weimer"  a écrit :
>
> * Bastien ROUCARIES:
>
> > Maybe crypto consolidation arround libnss will greatly help here.
> > jessie release goal ?
>
> NSS has lots of global state, and its proper initialization from
> another library is difficult.

Could you give some pointer?
 Switching over to it is probably
> doable, but it's not really straightforward.

 On the other hand, the
> TLS implementation in NSS has been doing host name validation for a
> long time, which is still problematic with some of the other
> implementations.
>
> NSS has its own problems with SUID/SGID binaries, but these could be
> addressed by switching PR_GetEnv to secure_getenv.

Could you also give some pointer?

I will open a wiki page
>
>
> --
> To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
listmas...@lists.debian.org
> Archive: http://lists.debian.org/87vc5mtuzr.fsf...@mid.deneb.enyo.de
>


libnss consolidation (was: Re: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-06-09 Thread Florian Weimer
* Bastien ROUCARIES:

> Maybe crypto consolidation arround libnss will greatly help here.
> jessie release goal ?

NSS has lots of global state, and its proper initialization from
another library is difficult.  Switching over to it is probably
doable, but it's not really straightforward.  On the other hand, the
TLS implementation in NSS has been doing host name validation for a
long time, which is still problematic with some of the other
implementations.

NSS has its own problems with SUID/SGID binaries, but these could be
addressed by switching PR_GetEnv to secure_getenv.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87vc5mtuzr.fsf...@mid.deneb.enyo.de



Re: libnss consolidation

2013-06-01 Thread Arto Jantunen
Brian May  writes:

> On 31 May 2013 20:19, Bastien ROUCARIES  wrote:
>
>> Gnutls is really crappy about suid
>> see http://lists.debian.org/debian-devel/2010/03/msg00298.html
>
>
> 2+ years later or 2 Debian releases later, I would have hoped these issues
> would be, somehow, magically, fixed by now :-(
>
> Basically makes libpam-ldap + TLS broken with certain programs.
>
> libnss-ldap is probably also broken, but seems you should be using
> libnss-ldapd these days which may (?) avoid these problems.

Yes, libpam-ldapd does avoid this problem. The ldap connections are
managed by a separate daemon (nslcd) that runs as a limited user account
and isn't suid. The pam (and nss) modules then contact this daemon via a
socket to run ldap queries. In addition to avoiding the gnutls bugs this
brings better latency and connection pooling (with libnss-ldap one needs
an ldap connection per nss using process, these pile up quite fast
indeed).

-- 
Arto Jantunen


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87y5aup1q0@iki.fi



Re: libnss consolidation (was: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-05-31 Thread brian m. carlson
On Fri, May 31, 2013 at 12:19:27PM +0200, Bastien ROUCARIES wrote:
> On Fri, May 31, 2013 at 4:42 AM, brian m. carlson
>  wrote:
> > NSS does not support TLS 1.2.  Since RC4 is not used securely in TLS,
> > and the only other choice in TLS 1.1 and earlier is block ciphers with
> > CBC, this means that there are no secure choices.  I know the lack of
> > TLS 1.2 support has caused customers of $DAYJOB endless heartache with
> > regard to PCI compliance.
> 
> Not true anymore:
> https://hg.mozilla.org/projects/nss/rev/5a9fa031aca5

Upstream bug 480514 is still open, and while it may have landed in the
main HEAD, it is not in any released version, and not in Debian.  It
would be irresponsible to transition to NSS when that would mean a
regression in security for users.

> > NSS supports fewer algorithms than either OpenSSL or GnuTLS.
> 
> Please fill bug:
> 
> Gnutls is really crappy about suid
> see http://lists.debian.org/debian-devel/2010/03/msg00298.html
> See also
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543941
> 
> And openssl has problem about license

I'm not saying these problems don't exist, but they have no bearing on
the fact that OpenSSL and GnuTLS support far more algorithms.

Also, it's hard to tell what algorithms and protocols are supported (and
how to use NSS at all), since Debian does not include documentation and
much of the d.m.o documentation is seriously out of date.  We can't
expect everyone to switch to NSS without accurate, maintained, and
distributed documentation.

NSS is also slow to accept patches and new features upstream.  It took
quite a long time to get TLS 1.1 and TLS 1.2 in, even when not having
them in had negative security implications.

Finally, does NSS support OpenSSL-style algorithm specifications to
select the protocols and algorithms used?  Lots of programs expect to be
able to pass this information to the library, and parts of e.g. the
Postfix configuration would fail to work without it.  This functionality
is required for PCI compliance, which I'm sure is something lots of
Debian's users want.

I'm all for crypto consolidation, but only if doing so doesn't cause
regressions in security or functionality.  Right now, that doesn't seem
to be the case.

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


signature.asc
Description: Digital signature


Re: libnss consolidation (was: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-05-31 Thread Brian May
On 31 May 2013 20:19, Bastien ROUCARIES  wrote:

> Gnutls is really crappy about suid
> see http://lists.debian.org/debian-devel/2010/03/msg00298.html


2+ years later or 2 Debian releases later, I would have hoped these issues
would be, somehow, magically, fixed by now :-(

Basically makes libpam-ldap + TLS broken with certain programs.

libnss-ldap is probably also broken, but seems you should be using
libnss-ldapd these days which may (?) avoid these problems.

(I stopped using LDAP for authentication as a direct result of these
problems - hardly a good selling point for Debian; so if something has
changed I may not have noticed)
-- 
Brian May 


Re: libnss consolidation (was: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-05-31 Thread Bastien ROUCARIES
On Fri, May 31, 2013 at 4:42 AM, brian m. carlson
 wrote:
> On Thu, May 30, 2013 at 04:04:47PM +0200, Bastien ROUCARIES wrote:
>> > Cons:
>> >
>> > - not all crypto libraries are equivalent; choosing one will exclude
>> > some functionality provided by others
>>
>> SEE compat layer
>> > - we somehow have to deal with legacy systems that can't convert
>> > - adoption of new software that uses something else is harder
>
> NSS does not support TLS 1.2.  Since RC4 is not used securely in TLS,
> and the only other choice in TLS 1.1 and earlier is block ciphers with
> CBC, this means that there are no secure choices.  I know the lack of
> TLS 1.2 support has caused customers of $DAYJOB endless heartache with
> regard to PCI compliance.

Not true anymore:
https://hg.mozilla.org/projects/nss/rev/5a9fa031aca5

Please open a debian bug

>
> NSS supports fewer algorithms than either OpenSSL or GnuTLS.

Please fill bug:

Gnutls is really crappy about suid
see http://lists.debian.org/debian-devel/2010/03/msg00298.html
See also
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543941

And openssl has problem about license
> --
> brian m. carlson / brian with sandals: Houston, Texas, US
> +1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
> OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cae2spazib3iezzla-sd3r0ft7ff6pdxkvkrzgxdsn1d7foz...@mail.gmail.com



Re: libnss consolidation (was: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-05-30 Thread brian m. carlson
On Thu, May 30, 2013 at 04:04:47PM +0200, Bastien ROUCARIES wrote:
> > Cons:
> >
> > - not all crypto libraries are equivalent; choosing one will exclude
> > some functionality provided by others
> 
> SEE compat layer
> > - we somehow have to deal with legacy systems that can't convert
> > - adoption of new software that uses something else is harder

NSS does not support TLS 1.2.  Since RC4 is not used securely in TLS,
and the only other choice in TLS 1.1 and earlier is block ciphers with
CBC, this means that there are no secure choices.  I know the lack of
TLS 1.2 support has caused customers of $DAYJOB endless heartache with
regard to PCI compliance.

NSS supports fewer algorithms than either OpenSSL or GnuTLS.

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


signature.asc
Description: Digital signature


Re: libnss consolidation (was: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-05-30 Thread Bastien ROUCARIES
Le 30 mai 2013 14:08, "Dennis van Dok"  a écrit :
>
> On 30-05-13 13:16, Bastien ROUCARIES wrote:
>
> > Using only one lib for crypto (libnss) will allow to use only one
> > trust certificate format
>
> 'Allow only one' doesn't immediately strike me as beneficial, but I see
> what you mean. The discussion is similar to others (such as about which
> init system to support) where the question is 'why do we have X
> implementations of Y?' where X > 1.
>
> There are pros and cons to such a bold plan as you propose. I can think
> of a few, and I'm sure others can think of many more. But more
> importantly, it takes effort to work out the plan, inventory the pros
> and cons, calculate the required efford and herd it along. Most work on
> Debian is on a voluntary basis, the available effort depends on what
> people will want to invest (even just to read this e-mail!). I'm not
> volunteering.
>
> But to seed the discussion (maybe):
>
> Pros: having only one crypto system will simplify the handling of
> certificates.

Simplify security audit and get faits certification

Avoid lice se issue with openssl ans GPL

Avoid problem with gnutls ans suid
>
> Cons:
>
> - not all crypto libraries are equivalent; choosing one will exclude
> some functionality provided by others

SEE compat layer
> - we somehow have to deal with legacy systems that can't convert
> - adoption of new software that uses something else is harder
>
> Cheers,
>
> Dennis van Dok
> --
> D.H. van Dok :: Software Engineer :: www.nikhef.nl/grid ::
> Phone +31 20 592 22 28 :: http://www.nikhef.nl/~dennisvd/


Re: libnss consolidation (was: X.509 and CA certificates for other purposes (i.e. the IGTF))

2013-05-30 Thread Dennis van Dok
On 30-05-13 13:16, Bastien ROUCARIES wrote:

> Using only one lib for crypto (libnss) will allow to use only one
> trust certificate format

'Allow only one' doesn't immediately strike me as beneficial, but I see
what you mean. The discussion is similar to others (such as about which
init system to support) where the question is 'why do we have X
implementations of Y?' where X > 1.

There are pros and cons to such a bold plan as you propose. I can think
of a few, and I'm sure others can think of many more. But more
importantly, it takes effort to work out the plan, inventory the pros
and cons, calculate the required efford and herd it along. Most work on
Debian is on a voluntary basis, the available effort depends on what
people will want to invest (even just to read this e-mail!). I'm not
volunteering.

But to seed the discussion (maybe):

Pros: having only one crypto system will simplify the handling of
certificates.

Cons:

- not all crypto libraries are equivalent; choosing one will exclude
some functionality provided by others
- we somehow have to deal with legacy systems that can't convert
- adoption of new software that uses something else is harder

Cheers,

Dennis van Dok
-- 
D.H. van Dok :: Software Engineer :: www.nikhef.nl/grid ::
Phone +31 20 592 22 28 :: http://www.nikhef.nl/~dennisvd/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51a74103.5040...@nikhef.nl