Re: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Ben Reser
On 1/10/14, 5:38 AM, Jeff Trawick wrote:
> [ ] It is an accepted practice (but not required) to obscure or omit the
> vulnerability impact in CHANGES or commit log information when committing 
> fixes
> for vulnerabilities to any branch.
> 
> [ ] It is mandatory to provide best available description and any available
> tracking information when committing fixes for vulnerabilities to any branch,
> delaying committing of the fix if the information shouldn't be provided yet.
> 
> [ ] ___ (fill in the blank)

The Subversion project has struggled with this same issue.  To the degree that
there has actually been a fair amount of thought into how to avoid doing
security by obscurity.

The processes we've discussed have varied from executing the release entirely
hidden from anyone but the PMC to simply publishing an advisory with a patch
right before committing to trunk (treating that advisory with patch as a
release with appropriate voting handled by PMC members privately).

You're always dealing with a certain amount of security by obscurity.  The bugs
we find often have existed for a long time.  If one person can find it someone
else certainly could.  For all we know the issues may have already been found
and only exploited in limited ways such that the issue was never reported.

Even with advance notification I've found that the binary packagers can take
their sweet time getting security fixes included.  Some binary packagers don't
really have a process that supports patching (they release one package for each
version without a method of identify versions that have been patched).
Administrators may not always know what to do with patches.  So frankly all of
the processes stink.

Yet, I think that the best process is to reveal security issues when you can
put your best foot forward and have things positioned to get the fixes in the
hands of as many users as possible as quickly as possible.  I think that's best
served by withholding details (even if you're doing so imperfectly) until
release or the issue is widely disclosed to the public.

It should be noted that not all security issues are equal.  For the most part
highly critical fixes are rare, when they do come up we could use a release
process that hides everything from non-PMC members until release time frame.
With other less severe issues possibly just disclosing immediately when we
apply the fix.

There doesn't need to be a one size fits all answer to this.  But I certainly
would like to see us have a consistent policy for determining which process to
follow.

So my vote wouldn't really fit into the options presented above.  I'd suggest
coming up with a process for varying levels of issues and criteria to determine
which process to follow.


Re: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Noel Butler
On Fri, 2014-01-10 at 08:38 -0500, Jeff Trawick wrote:

> 
> 
> [ X] It is mandatory to provide best available description and any
> available tracking information when committing fixes for
> vulnerabilities to any branch, delaying committing of the fix if the
> information shouldn't be provided yet.
> 





signature.asc
Description: This is a digitally signed message part


Re: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Marion & Christophe JAILLET


Le 10/01/2014 14:38, Jeff Trawick a écrit :
[ ] It is an accepted practice (but not required) to obscure or omit 
the vulnerability impact in CHANGES or commit log information when 
committing fixes for vulnerabilities to any branch.


[X] It is mandatory to provide best available description and any 
available tracking information when committing fixes for 
vulnerabilities to any branch, delaying committing of the fix if the 
information shouldn't be provided yet.


[ ] ___ (fill in the blank)

---/---



Could be also interesting to be able to deliver quick fix.

For example, 2.4.7 is the latest stable version. 2.4.8 has things 
back-ported from trunk little by little and should be T&R "one day" (in 
feb ?).


Should an important vulnerability be found, then releasing:
   - a 2.4.7.1or
   - 2.4.7 SP1or
   - 2.4.8 and delaying everything already accepted in backport for a 
later 2.4.9or

   - whatever else
with *only fixes* for this issue, could be interesting.

Doing so would avoid time for T&R and avoid releasing something in a hurry.

Best regards,
CJ


Re: Looking to T&R 2.4.8 in Feb...

2014-01-10 Thread Yann Ylavic
Also PR 55666, patches starting with
https://issues.apache.org/bugzilla/show_bug.cgi?id=55666#c12 have not
been reviewed/commited yet.

It's about mod_deflate input/output filters to be reentrant when
parsing zlib header, so to avoid "Zlib: Invalid header" or
"Insufficient data for inflate".

Regards.


Re: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Reindl Harald
+1

in some cases re-consider if a used option is really needed
and disable it may close a vulnerability, the admin only
needs to know that there is danger

Am 10.01.2014 15:24, schrieb Jim Jagielski:
> +1
> On Jan 10, 2014, at 8:44 AM, Jeff Trawick  wrote:
> 
>> [X] It is mandatory to provide best available description and any available 
>> tracking information when committing fixes for vulnerabilities to any 
>> branch, delaying committing of the fix if the information shouldn't be 
>> provided yet.
>>
>> --/--
>>
>> IMO it is not appropriate to let skilled attackers see a code change (which 
>> they can analyze to determine if there is an impact that they can exploit) 
>> if you are not going to make it possible for the general user community 
>> looking at the same commit activity to decide if they need to take an action.




signature.asc
Description: OpenPGP digital signature


Re: Looking to T&R 2.4.8 in Feb...

2014-01-10 Thread Yann Ylavic
Helo,

could http://svn.apache.org/r1538776 be considered for backport too (PR 55475)?

It's about mod_proxy to detect/handle incomplete (interrupted) backend
responses.

Regards,
Yann.


Re: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Jim Jagielski
+1
On Jan 10, 2014, at 8:44 AM, Jeff Trawick  wrote:

> [X] It is mandatory to provide best available description and any available 
> tracking information when committing fixes for vulnerabilities to any branch, 
> delaying committing of the fix if the information shouldn't be provided yet.
> 
> --/--
> 
> IMO it is not appropriate to let skilled attackers see a code change (which 
> they can analyze to determine if there is an impact that they can exploit) if 
> you are not going to make it possible for the general user community looking 
> at the same commit activity to decide if they need to take an action.
> 
> -- 
> Born in Roswell... married an alien...
> http://emptyhammock.com/



AW: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Plüm , Rüdiger , Vodafone Group


Von: Jeff Trawick [mailto:traw...@gmail.com]
Gesendet: Freitag, 10. Januar 2014 14:39
An: Apache HTTP Server Development List
Betreff: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to 
vulnerabilities

Open source projects, ASF or otherwise, have varying procedures for commits of 
fixes to vulnerabilities.  One important aspect of these procedures is whether 
or not fixes to vulnerabilities can be committed to a repository with commit 
logs and possibly CHANGES entries which purposefully obscure the vulnerability 
and omit any available vulnerability tracking information.

(The vulnerabilities I refer to are those which are not already announced or 
otherwise generally known to the user community, and where the would-be 
committer knows that a vulnerability is fixed by the code change possibly being 
committed.  Often it will have been discussed previously with fellow httpd 
developers in a private forum.)

[ ] It is an accepted practice (but not required) to obscure or omit the 
vulnerability impact in CHANGES or commit log information when committing fixes 
for vulnerabilities to any branch.

[ X ] It is mandatory to provide best available description and any available 
tracking information when committing fixes for vulnerabilities to any branch, 
delaying committing of the fix if the information shouldn't be provided yet.

[ ] ___ (fill in the blank)

---/---

Obscuring details about a code change (the first choice above) presumably 
wouldn't be done for a very obvious and high severity vulnerability.  I think 
that the possible justification for following the first choice for a particular 
fix is that the committer feels that the vulnerability isn't severe enough to 
completely hide it but it is severe enough that the vulnerability impact 
shouldn't be publicized until there is a proposed release with the fix which is 
being tested.



Regards

Rüdiger


Re: [VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Jeff Trawick
[X] It is mandatory to provide best available description and any available
tracking information when committing fixes for vulnerabilities to any
branch, delaying committing of the fix if the information shouldn't be
provided yet.

--/--

IMO it is not appropriate to let skilled attackers see a code change (which
they can analyze to determine if there is an impact that they can exploit)
if you are not going to make it possible for the general user community
looking at the same commit activity to decide if they need to take an
action.

-- 
Born in Roswell... married an alien...
http://emptyhammock.com/


[VOTE] obscuring (or not) commit logs/CHANGES for fixes to vulnerabilities

2014-01-10 Thread Jeff Trawick
Open source projects, ASF or otherwise, have varying procedures for commits
of fixes to vulnerabilities.  One important aspect of these procedures is
whether or not fixes to vulnerabilities can be committed to a repository
with commit logs and possibly CHANGES entries which purposefully obscure
the vulnerability and omit any available vulnerability tracking information.

(The vulnerabilities I refer to are those which are not already announced
or otherwise generally known to the user community, and where the would-be
committer knows that a vulnerability is fixed by the code change possibly
being committed.  Often it will have been discussed previously with fellow
httpd developers in a private forum.)

[ ] It is an accepted practice (but not required) to obscure or omit the
vulnerability impact in CHANGES or commit log information when committing
fixes for vulnerabilities to any branch.

[ ] It is mandatory to provide best available description and any available
tracking information when committing fixes for vulnerabilities to any
branch, delaying committing of the fix if the information shouldn't be
provided yet.

[ ] ___ (fill in the blank)

---/---

Obscuring details about a code change (the first choice above) presumably
wouldn't be done for a very obvious and high severity vulnerability.  I
think that the possible justification for following the first choice for a
particular fix is that the committer feels that the vulnerability isn't
severe enough to completely hide it but it is severe enough that the
vulnerability impact shouldn't be publicized until there is a proposed
release with the fix which is being tested.


Re: svn commit: r1554300 - in /httpd/httpd/trunk: CHANGES include/ap_mmn.h include/ap_regex.h include/http_core.h modules/proxy/mod_proxy.c modules/proxy/mod_proxy.h server/core.c server/request.c ser

2014-01-10 Thread Ruediger Pluem


minf...@apache.org wrote:
> Author: minfrin
> Date: Mon Dec 30 19:50:52 2013
> New Revision: 1554300
> 
> URL: http://svn.apache.org/r1554300
> Log:
> core: Support named groups and backreferences within the LocationMatch,
> DirectoryMatch, FilesMatch and ProxyMatch directives.
> 
> Modified:
> httpd/httpd/trunk/CHANGES
> httpd/httpd/trunk/include/ap_mmn.h
> httpd/httpd/trunk/include/ap_regex.h
> httpd/httpd/trunk/include/http_core.h
> httpd/httpd/trunk/modules/proxy/mod_proxy.c
> httpd/httpd/trunk/modules/proxy/mod_proxy.h
> httpd/httpd/trunk/server/core.c
> httpd/httpd/trunk/server/request.c
> httpd/httpd/trunk/server/util_pcre.c
> 

> Modified: httpd/httpd/trunk/server/util_pcre.c
> URL: 
> http://svn.apache.org/viewvc/httpd/httpd/trunk/server/util_pcre.c?rev=1554300&r1=1554299&r2=1554300&view=diff
> ==
> --- httpd/httpd/trunk/server/util_pcre.c (original)
> +++ httpd/httpd/trunk/server/util_pcre.c Mon Dec 30 19:50:52 2013
>  #define APR_WANT_STRFUNC
> @@ -124,7 +125,7 @@ AP_DECLARE(int) ap_regcomp(ap_regex_t * 
>  const char *errorptr;
>  int erroffset;
>  int errcode = 0;
> -int options = 0;
> +int options = PCRE_DUPNAMES;

This fails to compile on older PCRE versions that do not know PCRE_DUPNAMES, 
like 6.6
on RHEL 5.

How about

Index: util_pcre.c
===
--- util_pcre.c (revision 1556947)
+++ util_pcre.c (working copy)
@@ -125,7 +125,12 @@
 const char *errorptr;
 int erroffset;
 int errcode = 0;
+/* PCRE_DUPNAMES is only present in more recent versions of PCRE */
+#ifdef PCRE_DUPNAMES
 int options = PCRE_DUPNAMES;
+#else
+int options = 0;
+#endif

 if ((cflags & AP_REG_ICASE) != 0)
 options |= PCRE_CASELESS;


instead?

>  
>  if ((cflags & AP_REG_ICASE) != 0)
>  options |= PCRE_CASELESS;

Regards

Rüdiger


Re: svn commit: r1556815 - in /httpd/httpd/branches/2.4.x: ./ CHANGES STATUS

2014-01-10 Thread Ruediger Pluem


j...@apache.org wrote:
> Author: jim
> Date: Thu Jan  9 14:28:39 2014
> New Revision: 1556815
> 
> URL: http://svn.apache.org/r1556815
> Log:
> Merge r1524368, r1524388 from trunk:
> 
> Use apr_socket_timeout_get instead of hard-coded 30 seconds timeout.
> 
> 
> Use apr_socket_timeout_get instead of hard-coded 30 seconds timeout.
> 
> Document r1524368 in CHANGES.
> 
> Submitted by: jkaluza
> Reviewed/backported by: jim
> 
> Modified:
> httpd/httpd/branches/2.4.x/   (props changed)
> httpd/httpd/branches/2.4.x/CHANGES
> httpd/httpd/branches/2.4.x/STATUS


I guess you missed to commit the implementation :-)

Regards

Rüdiger