Re: restructuring mod_ssl as an overlay

2006-06-09 Thread Plüm , Rüdiger , VF EITO


 -Ursprüngliche Nachricht-
 Von: Colm MacCarthaigh 
 
 After that, based on your excellent summary, I'm begining to see the
 wisdom of a subproject - despite the overhead, maximising developer
 involvement and the potential community size is much more important.

Just for my clarification: Keeping mod_ssl inside the tree would ban
developer involvement (and downloads) from the T-8 countries, right?
What is the actual list of T-8 countries? I found older lists that consist
of Cuba, Syria, North Korea, Sudan, Iran, Libya, Iraq.

I guess that Libya and Iraq have fallen of this list in the meantime. So that
would mean that 5 countries would remain where we need to impose these
restrictions, correct?


Regards

Rüdiger



Re: restructuring mod_ssl as an overlay

2006-06-09 Thread Plüm , Rüdiger , VF EITO


 -Ursprüngliche Nachricht-
 Von: Roy T. Fielding 

 The sane solution would be to convince the US government to remove
 encryption from the export control list, since that regulation has
 been totally ineffective.  That is not likely to happen during this

I totally agree, but I fear that this approach will not bring us to a solution 
any time
soon :-). Regrettably we have to deal with the legal situation as it is and
find the best way out.

Regards

Rüdiger



Re: restructuring mod_ssl as an overlay

2006-06-09 Thread Joe Orton
On Thu, Jun 08, 2006 at 02:47:59PM -0700, Roy T. Fielding wrote:
 to with a URL.  That is no big deal.  The big deal is that 5D002
 classification also means that it is illegal for the ASF to knowingly
 allow anyone residing in, or a citizen of, the T-8 countries, or anyone
 on the denied persons list, to even participate in our project,
 let alone download packages, since that participation would be a
 deemed export.  That is why I suggested a separate (sub)project,
 so that the httpd product could exist separately and be completely
 open to participation and downloads.  Just making it a release-time
 build separation is not sufficient.

OK, this is certainly a big deal.

Would only committers count as participating in the project for this 
purpose, do you think?  Random people submitting patches would not?

Regards,

joe


Re: restructuring mod_ssl as an overlay

2006-06-09 Thread Plüm , Rüdiger , VF EITO


 -Ursprüngliche Nachricht-
 Von: Joe Orton [
 
 Would only committers count as participating in the project 
 for this 
 purpose, do you think?  Random people submitting patches would not?

Stupid question: How can someone who is not allowed to download the sources
can submit patches? :-).

Regards

Rüdiger



Re: restructuring mod_ssl as an overlay

2006-06-09 Thread Colm MacCarthaigh
On Fri, Jun 09, 2006 at 12:29:06PM +0200, Plüm, Rüdiger, VF EITO wrote:
  -Ursprüngliche Nachricht-
  Von: Joe Orton [
  
  Would only committers count as participating in the project 
  for this 
  purpose, do you think?  Random people submitting patches would not?
 
 Stupid question: How can someone who is not allowed to download the sources
 can submit patches? :-).

There is *nothing* preventing them from downloading and using our
sources. That's a non-issue :-)

-- 
Colm MacCárthaighPublic Key: [EMAIL PROTECTED]


Knocking items off the plate, one by one

2006-06-09 Thread William A. Rowe, Jr.

Before Dublin, I'd like to scratch several of my own itches to start with
something of a 'blank page' and moving forward with new stuff, rather than
our usual rehashes @ the hackathon.

Numero Uno is to permanantly remove apache 1.3.x from our live
http://www.apache.org/dist/httpd/binaries/win32/ site, I have no interest
in rolling 1.3.36 since it solves no apparent problems that 1.3.34 had,
but moreso, httpd 2.0 is well over four years old.

http://archives.apache.org/dist/httpd is always out there ;-)

I simply have no reason to roll 1.3.x binaries as there is no sane reason
for them to continue to be used on Windows.  (As I've said before, on Unix
I'm entirely neutral.)  Please vote;

  [ ] Jettison apache/win 1.3 binaries to a footnote of history in archives
  [ ] Beg of Bill, One more Round! of 1.3.36 for old times sake
  [ ] Keep them available from www even if they are never updated again
  [ ] I'm insane, I'll take over rolling 1.3, fill me in on the procedure 
Bill?

If jettisoned, I'll simply remove any 1.3 language from the page.  There is
already a note Looking for older binaries? Please don't which goes on to
point out where they live for the sadists.  That should cover it.  Any other
thoughts?

Second verse, same as the first, we have some _old_ directories lingering in
httpd/binaries/..., I will kill these today once I know for a fact they are
mirrored already on archives.apache.org (I thought we had killed these before.)

Third verse (sing along!) our web site reports

  Fixed in Apache httpd 1.3.32

moderate: mod_proxy buffer overflow CVE-2004-0492

  Fixed in Apache httpd 2.0.55

moderate: HTTP Request Spoofing CVE-2005-2088

Each of these is out of the control of the operator once they enable common
features, as opposed to other more recent, very specific flaws that need
specific configuration, unusual use cases or local web administration access
to trigger or reproduce.  (Who uses IMAP lol?)

So the final vote that we need to have a concensus on is;

  [ ] Remove all pre 2.0.55/pre 1.3.32 binaries from www.a.o (to archive.a.o)
  [ ] Leave the last unmaintained 2.0.x in whatever state it's in
  [ ] Leave the last unmaintained 1.3.x and 2.0.x in whatever state they are in

Votes/comments please?

Thanks,

Bill




Re: Knocking items off the plate, one by one

2006-06-09 Thread Mads Toftum
On Fri, Jun 09, 2006 at 01:02:23PM -0500, William A. Rowe, Jr. wrote:

From the peanut gallery
 
   [X] Jettison apache/win 1.3 binaries to a footnote of history in archives

I'd even go as far as removing all of them or if _really_ wanting to
keep one, then keep the latest around but be ready to remove that if any
security problems are discovered in the future.

   [ ] Remove all pre 2.0.55/pre 1.3.32 binaries from www.a.o (to 
   archive.a.o)
   [ ] Leave the last unmaintained 2.0.x in whatever state it's in
   [ ] Leave the last unmaintained 1.3.x and 2.0.x in whatever state they 
   are in

[X] As above - keep the latest as long as it is good, but be ready to
remove it. 

I don't really see much reason for having 2.0.x bins at all, but keeping
old ones around is just asking for trouble imho.
Sure, if someone wants to roll bins from 2.0, then no problem - but
keeping an archive of old versions is just like giving people enough
rope...


vh

Mads Toftum
-- 
`Darn it, who spiked my coffee with water?!' - lwall



Re: svn commit: r413158 - /httpd/site/trunk/xdocs/download.xml

2006-06-09 Thread Ruediger Pluem


On 06/09/2006 10:47 PM,  wrote:
 Author: wrowe
 Date: Fri Jun  9 13:47:02 2006
 New Revision: 413158
 
 URL: http://svn.apache.org/viewvc?rev=413158view=rev
 Log:
 
   Note 2.2.2 was our 10 year celebration I believe, (just to put something
   interesting front and center under that top announcement, and declare
   this is the definative recommended version.)

Maybe nitpicking, but I think 2.2.0 was released exactly at the 10th 
anniversary.
But of course 2.2.2 represents *over* 10 years of innovation, so the text is
still fine :-).

Regards

Rüdiger



Re: Knocking items off the plate, one by one

2006-06-09 Thread Ruediger Pluem


On 06/09/2006 08:02 PM, William A. Rowe, Jr. wrote:

 I'm entirely neutral.)  Please vote;
 
   [X] Jettison apache/win 1.3 binaries to a footnote of history in archives
   [ ] Beg of Bill, One more Round! of 1.3.36 for old times sake
   [ ] Keep them available from www even if they are never updated again
   [ ] I'm insane, I'll take over rolling 1.3, fill me in on the
 procedure Bill?

 
 So the final vote that we need to have a concensus on is;
 
   [X] Remove all pre 2.0.55/pre 1.3.32 binaries from www.a.o (to
 archive.a.o)
   [ ] Leave the last unmaintained 2.0.x in whatever state it's in
   [ ] Leave the last unmaintained 1.3.x and 2.0.x in whatever state they
 are in
 
 Votes/comments please?
 

Please find my X'es above.

Regards

Rüdiger


Re: svn commit: r413158 - /httpd/site/trunk/xdocs/download.xml

2006-06-09 Thread William A. Rowe, Jr.

Ruediger Pluem wrote:


On 06/09/2006 10:47 PM,  wrote:


Author: wrowe
Date: Fri Jun  9 13:47:02 2006
New Revision: 413158

URL: http://svn.apache.org/viewvc?rev=413158view=rev
Log:

 Note 2.2.2 was our 10 year celebration I believe, (just to put something
 interesting front and center under that top announcement, and declare
 this is the definative recommended version.)



Maybe nitpicking, but I think 2.2.0 was released exactly at the 10th 
anniversary.
But of course 2.2.2 represents *over* 10 years of innovation, so the text is
still fine :-).


True - I'm glad I didn't edit to say 2.2.2 celebrates - I believe you were
(even if it's not an exact science dating these things, I believe that's what
we attributed 2.2.0 for ;-)



Re: Knocking items off the plate, one by one

2006-06-09 Thread Sander Temme


On Jun 9, 2006, at 12:57 PM, Mads Toftum wrote:

I don't really see much reason for having 2.0.x bins at all, but  
keeping

old ones around is just asking for trouble imho.


Here's a scenario: I have mod_x, compiled against Apache HTTP Server  
version y. The maker of mod_x are bitches and do not keep up with  
Apache development, so when the MMN change, the module breaks. They  
say mod_x is supported with Apache 2.0.y. Go get Apache 2.0.y if you  
want to use mod_x. Sorry, we cannot support versions of Apache later  
than 2.0.y. Don't even think about mentioning Apache 2.2. Now give us  
all your money.


It would be a great thing if I could download a binary of Apache HTTP  
Server version y to drop mod_x into, especially on platforms that do  
not come with a C compiler (cough Win32 cough). This would make life  
considerably easier if I had to quickly integrate mod_x, or if I had  
to replicate my customer's deployment environment down to the xes and  
ys.


In fact, this very scenario happened to me with Tomcat where I ran  
into some very finnicky version dependencies. Now we, in httpd land,  
don't habitually rewrite our entire project between dot versions, but  
it might be a good idea to make available a binary for the last  
released version before a major MMN bump. Disk is (fairly) cheap  
after all.


What trouble? Do we ever make any claims about our software beyond  
if it breaks, you get to keep the pieces? Source or otherwise?


S.

--
[EMAIL PROTECTED]http://www.temme.net/sander/
PGP FP: 51B4 8727 466A 0BC3 69F4  B7B8 B2BE BC40 1529 24AF




smime.p7s
Description: S/MIME cryptographic signature


Re: Knocking items off the plate, one by one

2006-06-09 Thread William A. Rowe, Jr.

Sander Temme wrote:


On Jun 9, 2006, at 12:57 PM, Mads Toftum wrote:


I don't really see much reason for having 2.0.x bins at all, but  keeping
old ones around is just asking for trouble imho.


What trouble? Do we ever make any claims about our software beyond  if 
it breaks, you get to keep the pieces? Source or otherwise?


Well, although I agree with Sander's assessment as far back as 2.0, I'm not
really fond of the argument to hang on to win32 1.3 specifically.  Unix?  If
one is packaged and doesn't have a vulnerability, sure.  Just make sure it's
not the first choice displayed for the user to pick from, shown anywhere.

And no, we don't warrentee the software.  But someone has to go through and
close worthless bug reports, triage #apache irc traffic, triage [EMAIL 
PROTECTED]
traffic.  Not saying this is you - or me even.  In fact that's why I asked,
because I figure the people who are kind enough to even both doing these
tasks are the ones to decide how long a stale source or binary package aught
to be hanging around.

As far as -this- list is concerned, I hope we are mostly excited for 2.e.x
stable and 2.o.x alpha and beta offerings that we are actually trying to
improve :)  Anyone dwelling heavily in improving 1.3 or 2.0 is really
saying to the list, here's my pocket veto of what you did in the current
trunk.  Anyone dwelling on fixing 1.3 or 2.0 - just to keep it working,
well I think most of them fall in Sander's camp - alot of folks must have
some server that is running mod_slowvendor, and they can't yet make a move,
or worse, they don't have internal engineering resources to move mod_ourfoo
which some dev long gone customized at the company.

So nothing against fixing bugs or keeping a 2.0 around at least as long as
it takes us to make 2.4 happen, here.  I'm partial to making 1.3 win32
binaries go away, and I'm partial to making any inherently insecure binary
go away.  Beyond that shrug/.

Bill


Re: restructuring mod_ssl as an overlay

2006-06-09 Thread Roy T. Fielding

On Jun 9, 2006, at 3:56 AM, Colm MacCarthaigh wrote:

On Fri, Jun 09, 2006 at 12:29:06PM +0200, Plüm, Rüdiger, VF EITO  
wrote:

-Ursprüngliche Nachricht-
Von: Joe Orton [

Would only committers count as participating in the project
for this
purpose, do you think?  Random people submitting patches would not?


Stupid question: How can someone who is not allowed to download  
the sources

can submit patches? :-).


There is *nothing* preventing them from downloading and using our
sources. That's a non-issue :-)


Right, the only issue is the ASF knowingly exporting to a known
person in the banned category.  For that reason, we may be better
off publishing all the disclaimers for every project and tell the
recipients to self-enforce.  We have no way of knowing where
people are geographically located or what their citizenship may be,
unless they insist on telling us.  Everything else is covered by
the TSU exception because our technical discussions are limited
to public lists.

   http://www.access.gpo.gov/bis/ear/txt/740.txt

In case anyone is wondering, yes we have talked to lawyers, several
times, and the result was partial -- we do qualify for the TSU
exception.  However, even the lawyers neglected to mention that
TSU section 740.13.e.2(ii) excludes

 (ii) Any knowing export or reexport to a
   country listed in Country Group E:1 in
   Supplement No. 1 to part 740 of the EAR.

and the best practice of publishing export guidelines on the
website to cover that paragraph is a relatively recent invention.

The only way to get a definitive ruling is to ask BIS for one
(the western regional office is in my town) prior to the first export.
The ASF has, instead, been operating according to the published
regulation in the EAR note

 Note to paragraph (e).  Posting encryption
   source code and corresponding object code on the
   Internet (e.g., FTP or World Wide Web site)
   where it may be downloaded by anyone neither
   establishes knowledge of a prohibited export or
   reexport for purposes of this paragraph, nor
   triggers any red flags necessitating the
   affirmative duty to inquire under the Know Your
   Customer guidance provided in Supplement No.
   3 to part 732 of the EAR.

being sufficient to represent guidance from BIS that what we have been
doing is allowed.

In addition, section 744.9 (Restrictions on technical assistance
by U.S. persons with respect to encryption items) applies
to those of us residing in, or citizen of, the U.S. and the presence
of the TSU exception to our work makes that okay as well [woohoo,
it also solves the issue of ASF folks speaking at conferences].

The Country Group E:1 can be found in

   http://www.access.gpo.gov/bis/ear/pdf/740spir.pdf

Today's list says Cuba, Iran, North Korea, Libya, Sudan, and Syria,
with Cuba, Iran, and Sudan being subject to a separate, comprehensive
embargo as well.

After reading through this again, I've decided to change my vote
from undecided to keeping the product as is and adding the export
notices to our site.  Otherwise, I wouldn't know what to do about
the comprehensive embargoes even if we split the project.

Roy