Re: 2.2.4 windows binary w/ssl?

2007-03-23 Thread Joe Orton
On Thu, Mar 22, 2007 at 09:14:32PM +0100, Mladen Turk wrote:
 Guenter Knauf wrote:
 Hi,
 Should we add a cert-creation .sh and .vbs script to support/ for this
 purpose (on any platform)?  Sounds like a great idea to me!
 +1 from me.
 If you find my vbs useful then I will contribute it.
  I've spent a good time to find at least something working;
 
 Drop an eye on:
 http://svn.apache.org/viewvc/tomcat/connectors/trunk/jni/examples/mkcerts?view=markup

- auto-generating dummy certs which claim to be issued by or to the ASF 
doesn't seem like a good idea at all
- the only hostnames referenced should be `hostname` or localhost; 
this uses some localhost.edu in a few places
- it's also a good idea to set a pseudo-random serial number on issued 
certs, e.g. use $RANDOM where available, fall back on $$/$PPID etc
- also particularly odd to encrypt the file storing the private key

joe


Re: 2.2.4 windows binary w/ssl?

2007-03-23 Thread Mladen Turk

Joe Orton wrote:

Drop an eye on:
http://svn.apache.org/viewvc/tomcat/connectors/trunk/jni/examples/mkcerts?view=markup


- auto-generating dummy certs which claim to be issued by or to the ASF 
doesn't seem like a good idea at all


It is an example, so anyone is entitled to change it for
its particular usage.


Regards,
Mladen.


Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread Guenter Knauf
Hi,
 I'll take this as a resounding no, and that the draft package is
 sufficient.  Moving it within 24 hrs unless I hear a specific
 technical objection.
I've heard from a couple of users that they prefer *.zip archives rather than 
the *.msi files; and hacked a WSH script to fix the config files when using a 
zip distribution. So I think it would be great to disribute a *.zip archive too 
in addition to the *.msi.

Regarding certificate creation I've hacked another simple WSH script a while 
ago, and got some positive feedback; however currently its not perfect yet 
since I had not the time to fully go trough all openssl settings;
I use currently this:
openssl req -x509 -nodes -days 999 -subj /[EMAIL 
PROTECTED]/C=US/ST=Oregon/L=Portland/O=Example Organisation/OU=IT 
Unit/CN=www.example.com -newkey rsa:1024 -keyout server.key -out server.crt

these certs are accepted by Apache and enable SSL access - however I get 
warnings in the error log:
[Wed Mar 21 02:11:55 2007] [warn] RSA server certificate is a CA certificate 
(BasicConstraints: CA == TRUE !?)

hints welcome!

If someone wants to play with the WSH script you can find it here:
http://www.gknw.net/vb/scripts/MkCerts.vbs

Although I'm not a big WSH fan - I think it makes sense on Win32 since its 
almost there, and the user doesnt need to install / download another tool just 
to fix confs or create certs.

Guenter.




Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread William A. Rowe, Jr.
Guenter Knauf wrote:
 I've heard from a couple of users that they prefer *.zip archives
 rather than the *.msi files; and hacked a WSH script to fix the config
 files when using a zip distribution. 

Should we add a cert-creation .sh and .vbs script to support/ for this
purpose (on any platform)?  Sounds like a great idea to me!


 So I think it would be great to 
 disribute a *.zip archive too in addition to the *.msi.

Well, it's not worth pleasing all the people, all the time.  But for those
who ask for 'just the files', you can always point out that...

  msiexec /a apache_2.2.4-x86-winnt-xxx.msi

will unpack the files to do whatever they like with them :-)  This works
whether the package has been installed, or not.

I'm not a fan of multiple-different flavors to download, I find they
create more support questions, not fewer.


Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread Sander Temme


On Mar 22, 2007, at 12:22 PM, William A. Rowe, Jr. wrote:


Guenter Knauf wrote:

I've heard from a couple of users that they prefer *.zip archives
rather than the *.msi files; and hacked a WSH script to fix the  
config

files when using a zip distribution.


Should we add a cert-creation .sh and .vbs script to support/ for this
purpose (on any platform)?  Sounds like a great idea to me!


+1. I assume you can execute that VBS on any ol' Windows box?


I'm not a fan of multiple-different flavors to download, I find they
create more support questions, not fewer.


+1

S.

--
[EMAIL PROTECTED]http://www.temme.net/sander/
Open Source Software Consultant
PGP FP: 51B4 8727 466A 0BC3 69F4  B7B8 B2BE BC40 1529 24AF

ApacheCon 2007 Europe, May 1-4 in Amsterdam
http://www.eu.apachecon.com/





smime.p7s
Description: S/MIME cryptographic signature


Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread William A. Rowe, Jr.
Sander Temme wrote:
 
 On Mar 22, 2007, at 12:22 PM, William A. Rowe, Jr. wrote:
 
 Guenter Knauf wrote:
 I've heard from a couple of users that they prefer *.zip archives
 rather than the *.msi files; and hacked a WSH script to fix the config
 files when using a zip distribution.

 Should we add a cert-creation .sh and .vbs script to support/ for this
 purpose (on any platform)?  Sounds like a great idea to me!
 
 +1. I assume you can execute that VBS on any ol' Windows box?

Any modern Windows box.  I just updated the /dist/httpd/binaries/win32
page to pretty much toss away any lingering 9x/NT4 references.


Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread Guenter Knauf
Hi,
 Should we add a cert-creation .sh and .vbs script to support/ for this
 purpose (on any platform)?  Sounds like a great idea to me!
+1 from me.
If you find my vbs useful then I will contribute it.
I've spent a good time to find at least something working; the Inet is full of 
stuff, but everyone does with another way - from one to three separate calls of 
openssl I found a lot; this shows that its not so trivial and clear to everyone 
to create proper certs Apache2 is happy with without throwing warnings

   msiexec /a apache_2.2.4-x86-winnt-xxx.msi

 will unpack the files to do whatever they like with them :-)  This works
 whether the package has been installed, or not.
ok, I knew this, and did already point that out; however what do you think 
about adding this hint to the README in 
http://www.apache.org/dist/httpd/binaries/win32/ ?

Guenter.




Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread Mladen Turk

Guenter Knauf wrote:

Hi,

Should we add a cert-creation .sh and .vbs script to support/ for this
purpose (on any platform)?  Sounds like a great idea to me!

+1 from me.
If you find my vbs useful then I will contribute it.

 I've spent a good time to find at least something working;

Drop an eye on:
http://svn.apache.org/viewvc/tomcat/connectors/trunk/jni/examples/mkcerts?view=markup

I've also spend a good deal of time on that, so it might be helpful :)

Regards,
Mladen.


Re: 2.2.4 windows binary w/ssl?

2007-03-22 Thread Guenter Knauf
Hi Mladen,
 Drop an eye on:
 http://svn.apache.org/viewvc/tomcat/connectors/trunk/jni/examples/mkcerts?
 view=markup

 I've also spend a good deal of time on that, so it might be helpful :)
yeah!! Thanks! Will do, and update my vbs soon

thanks, Guenter.




Re: 2.2.4 windows binary w/ssl?

2007-03-16 Thread William A. Rowe, Jr.
William A. Rowe, Jr. wrote:
 William A. Rowe, Jr. wrote:
 I'd like to propose we ship apache_2.2.4-win32-x86-openssl-0.9.8d.msi with
 this release.  Couple of notes...
 
 Did anyone else have feedback on the comments/notes?  I know Roy's made some
 additional progress with the notification requirements, and would like to be
 ready when he shares word that httpd and openssl notices are all in order.

I'll take this as a resounding no, and that the draft package is
sufficient.  Moving it within 24 hrs unless I hear a specific
technical objection.




Re: 2.2.4 windows binary w/ssl?

2007-03-16 Thread Roy T. Fielding

On Mar 16, 2007, at 2:48 PM, William A. Rowe, Jr. wrote:


William A. Rowe, Jr. wrote:

William A. Rowe, Jr. wrote:
I'd like to propose we ship apache_2.2.4-win32-x86- 
openssl-0.9.8d.msi with

this release.  Couple of notes...


Did anyone else have feedback on the comments/notes?  I know Roy's  
made some
additional progress with the notification requirements, and would  
like to be
ready when he shares word that httpd and openssl notices are all  
in order.


I'll take this as a resounding no, and that the draft package is
sufficient.  Moving it within 24 hrs unless I hear a specific
technical objection.


I think, if you mean is it okay to post 2.2.4 binaries containing
openssl?, then the answer is yes.

Roy


Re: 2.2.4 windows binary w/ssl?

2007-03-16 Thread William A. Rowe, Jr.
Roy T. Fielding wrote:
 On Mar 16, 2007, at 2:48 PM, William A. Rowe, Jr. wrote:
 
 William A. Rowe, Jr. wrote:
 William A. Rowe, Jr. wrote:
 I'd like to propose we ship
 apache_2.2.4-win32-x86-openssl-0.9.8d.msi with
 this release.  Couple of notes...

 Did anyone else have feedback on the comments/notes?  I know Roy's
 made some
 additional progress with the notification requirements, and would
 like to be
 ready when he shares word that httpd and openssl notices are all in
 order.

 I'll take this as a resounding no, and that the draft package is
 sufficient.  Moving it within 24 hrs unless I hear a specific
 technical objection.
 
 I think, if you mean is it okay to post 2.2.4 binaries containing
 openssl?, then the answer is yes.

Correct - I meant 'are there any other feedbacks' and the quiet tells
me nobody has anything to add.

I believe you already confirmed we are solid on notifications (or I
wouldn't have placed them up in /dev/dist/ for evaluation :)

Bill


Re: 2.2.4 windows binary w/ssl?

2007-01-12 Thread Issac Goldstand
William A. Rowe, Jr. wrote:
 Issac Goldstand wrote:
 I'd agree if mod_ssl is disabled by default, but if it is, why are they
 downloading the mod_ssl-enabled installer?
 
 You miss the point, it's illegal in some jurisdictions to possess/use
 such cryptography.  That installer will remain as a service to those
 communities, nothing more.

I understand that.  I assumed in this statement that there'd 2
installers - an SSL-msi and a non-SSL msi.  Based on that, it'd be
pointless to disable SSL by default in the SSL-enabled package
(otherwise, you'd download the other one).


Re: 2.2.4 windows binary w/ssl?

2007-01-11 Thread Issac Goldstand


William A. Rowe, Jr. wrote:
 Jorge Schrauwen wrote:
 Do note that not all users that will chose the SSL package will know how
 to correctly fill in the fields.
 
 s/not all/a small minority of/
 
 They can't figure out what Domain Name means, let's be serious :)
 
 On 1/10/07, *Issac Goldstand* [EMAIL PROTECTED]
 mailto:[EMAIL PROTECTED] wrote:

 I think the MSI should autogenerate a self-signed cert at least (last
 thing we need is for people to deploy a static pre-distributed cert
 which would make it that much easier to do man-in-the-middle attacks).
 
 I agree, static keys are only for pure localhost-style examples, just a bad
 idea for something this flexible.  As far as a default selfsigned cert,
 I was thinking of using the server name they filled in already as it stands,
 and let them replace it with a worthwhile one.

You mean as the default entry, right?  It should be changeable (and
should affect the ServerName in the default SSL virtualhost, of course)

 
 Would be great if the MSI had a choice to use an existing cert, or
 generate a new one with a user supplied DN (fill-in fields for CN, OU, O
 , L, ST, C), and generated a self-signed cert with that + a .csr for
 sending to a Trusted Third-Party for signing.

 Would also be great if there was some GUI for importing a signed cert
 post-install, similar to the IIS wizard, but that's probably pushing it.
 
 Well, there are dozens of utilities out there that do that, I'm not compelled
 in the least to add it to the httpd package.

As I said, that's probably pushing it :-)

 
 Justin Erenkrantz wrote:
 I'd prefer to just point them at the instructions for generating their
 own key rather than us distributing a 'fake' one.  -- justin
 
 ./configure; make; make install
 
 We don't deposit a certificate today for Unix.  After considering this a bit
 more, I agree with jerenkrantz.

Didn't there used to be a make cert in the Apache 1.3 days?  I
distinctly remember having that option at some point, though it may have
been from a modified source, like an SRPM or something...

 At least, initially.  I'd rather see something out the door, with all the
 appropriate comments in the user community of the best way (in their opinion)
 to proceed.

IMHO, that's like saying that the MSI shouldn't install the windows
service for you, or modify the default .conf files to suit your install.

If you want to do it this way, distribute a binary .zip  If we're
putting it in a GUI installer that knows how to prepare the initial
environment, this should definitely be one of the things it does...

 
 Then if we really believe the server install should do something to either
 help deposit a cert/key for their server, or a post-install command should
 be provided for this purpose, then we should ensure win and unix are offering
 the exact same facility.
 

I'll look around for the make cert rule that I remember seeing.  Should
be very simple to do this for unix, assuming an openssl binary exists
and is on the path

  Issac


Re: 2.2.4 windows binary w/ssl?

2007-01-11 Thread Issac Goldstand


Jorge Schrauwen wrote:
 
 
 On 1/10/07, *William A. Rowe, Jr.* [EMAIL PROTECTED]
 mailto:[EMAIL PROTECTED] wrote:
 
 Jorge Schrauwen wrote:
  Do note that not all users that will chose the SSL package will
 know how
  to correctly fill in the fields.
 
 s/not all/a small minority of/
 
 
 Do not underestimate user stupidity ;) ok maybe the number won't be
 overly to large but I can sure see the post flooding in on the Apache BB's!

True, but Bill has a point.  If they can't fill in Domain Name,
Company Name (Optional), City, State, Country, then SSL install
is the least of their problems ;-)

Seriously, it's just an issue of us naming the fields well.

[snip]

 ./configure; make; make install
 
 We don't deposit a certificate today for Unix.  After considering
 this a bit
 more, I agree with jerenkrantz.
 
 
 True... if you don't enable mod_ssl by default and add a note in the
 conf file It should be rather safe to not include a cert. Pointing them
 to a docs or wiki guide/how to would be a good idea.

I'd agree if mod_ssl is disabled by default, but if it is, why are they
downloading the mod_ssl-enabled installer?

The stupid user issue you mention is a great answer here, but not good
enough to disabled mod_ssl by default if there are seperate SSL and
non-SSL installers.

  Issac


Re: 2.2.4 windows binary w/ssl?

2007-01-11 Thread Jorge Schrauwen

On 1/11/07, Issac Goldstand [EMAIL PROTECTED] wrote:



 ./configure; make; make install

 We don't deposit a certificate today for Unix.  After considering
 this a bit
 more, I agree with jerenkrantz.


 True... if you don't enable mod_ssl by default and add a note in the
 conf file It should be rather safe to not include a cert. Pointing them
 to a docs or wiki guide/how to would be a good idea.

I'd agree if mod_ssl is disabled by default, but if it is, why are they
downloading the mod_ssl-enabled installer?

The stupid user issue you mention is a great answer here, but not good
enough to disabled mod_ssl by default if there are seperate SSL and
non-SSL installers.





Good point on this, it makes no sense to have mod_ssl disabled in the ssl
binary. My silly mistake.


--
~Jorge


Re: 2.2.4 windows binary w/ssl?

2007-01-11 Thread William A. Rowe, Jr.
Issac Goldstand wrote:
 
 I'd agree if mod_ssl is disabled by default, but if it is, why are they
 downloading the mod_ssl-enabled installer?

You miss the point, it's illegal in some jurisdictions to possess/use
such cryptography.  That installer will remain as a service to those
communities, nothing more.


Re: 2.2.4 windows binary w/ssl?

2007-01-10 Thread Justin Erenkrantz

On 1/10/07, William A. Rowe, Jr. [EMAIL PROTECTED] wrote:

A final question for all, do we wish to install an arbitrary, on the fly self
signed default.crt/default.key?  Do we want to help them fill out the details
or use stock details?  Or do we want them to use openssl.exe to generate one
for themselves?


I'd prefer to just point them at the instructions for generating their
own key rather than us distributing a 'fake' one.  -- justin


Re: 2.2.4 windows binary w/ssl?

2007-01-10 Thread Issac Goldstand
I think the MSI should autogenerate a self-signed cert at least (last
thing we need is for people to deploy a static pre-distributed cert
which would make it that much easier to do man-in-the-middle attacks).

Would be great if the MSI had a choice to use an existing cert, or
generate a new one with a user supplied DN (fill-in fields for CN, OU, O
, L, ST, C), and generated a self-signed cert with that + a .csr for
sending to a Trusted Third-Party for signing.

Would also be great if there was some GUI for importing a signed cert
post-install, similar to the IIS wizard, but that's probably pushing it.

Just my $0.02,
  Issac

William A. Rowe, Jr. wrote:
  A final question for all, do we wish to install an arbitrary, on the
fly self
 signed default.crt/default.key?  Do we want to help them fill out the details
 or use stock details?  Or do we want them to use openssl.exe to generate one
 for themselves?


Re: 2.2.4 windows binary w/ssl?

2007-01-10 Thread Jorge Schrauwen

Do note that not all users that will chose the SSL package will know how to
correctly fill in the fields. My experience tells me if there is a package
with XYZ and without most chose it with XYZ even if they don't need it.

So if there is a dialog in the installer that would ask for the
information... make sure there is lots of information available on what to
enter!

My 0,02 EUR Cent ;)

On 1/10/07, Issac Goldstand [EMAIL PROTECTED] wrote:


I think the MSI should autogenerate a self-signed cert at least (last
thing we need is for people to deploy a static pre-distributed cert
which would make it that much easier to do man-in-the-middle attacks).

Would be great if the MSI had a choice to use an existing cert, or
generate a new one with a user supplied DN (fill-in fields for CN, OU, O
, L, ST, C), and generated a self-signed cert with that + a .csr for
sending to a Trusted Third-Party for signing.

Would also be great if there was some GUI for importing a signed cert
post-install, similar to the IIS wizard, but that's probably pushing it.

Just my $0.02,
  Issac

William A. Rowe, Jr. wrote:
 A final question for all, do we wish to install an arbitrary, on the
fly self
 signed default.crt/default.key?  Do we want to help them fill out the
details
 or use stock details?  Or do we want them to use openssl.exe to generate
one
 for themselves?





--
~Jorge


Re: 2.2.4 windows binary w/ssl?

2007-01-10 Thread William A. Rowe, Jr.
Jorge Schrauwen wrote:
 Do note that not all users that will chose the SSL package will know how
 to correctly fill in the fields.

s/not all/a small minority of/

They can't figure out what Domain Name means, let's be serious :)

 On 1/10/07, *Issac Goldstand* [EMAIL PROTECTED]
 mailto:[EMAIL PROTECTED] wrote:
 
 I think the MSI should autogenerate a self-signed cert at least (last
 thing we need is for people to deploy a static pre-distributed cert
 which would make it that much easier to do man-in-the-middle attacks).

I agree, static keys are only for pure localhost-style examples, just a bad
idea for something this flexible.  As far as a default selfsigned cert,
I was thinking of using the server name they filled in already as it stands,
and let them replace it with a worthwhile one.

 Would be great if the MSI had a choice to use an existing cert, or
 generate a new one with a user supplied DN (fill-in fields for CN, OU, O
 , L, ST, C), and generated a self-signed cert with that + a .csr for
 sending to a Trusted Third-Party for signing.
 
 Would also be great if there was some GUI for importing a signed cert
 post-install, similar to the IIS wizard, but that's probably pushing it.

Well, there are dozens of utilities out there that do that, I'm not compelled
in the least to add it to the httpd package.

Justin Erenkrantz wrote:

 I'd prefer to just point them at the instructions for generating their
 own key rather than us distributing a 'fake' one.  -- justin

./configure; make; make install

We don't deposit a certificate today for Unix.  After considering this a bit
more, I agree with jerenkrantz.

At least, initially.  I'd rather see something out the door, with all the
appropriate comments in the user community of the best way (in their opinion)
to proceed.

Then if we really believe the server install should do something to either
help deposit a cert/key for their server, or a post-install command should
be provided for this purpose, then we should ensure win and unix are offering
the exact same facility.

Does this sound sane?



Re: 2.2.4 windows binary w/ssl?

2007-01-10 Thread Jorge Schrauwen

On 1/10/07, William A. Rowe, Jr. [EMAIL PROTECTED] wrote:


Jorge Schrauwen wrote:
 Do note that not all users that will chose the SSL package will know how
 to correctly fill in the fields.

s/not all/a small minority of/



Do not underestimate user stupidity ;) ok maybe the number won't be overly
to large but I can sure see the post flooding in on the Apache BB's!

They can't figure out what Domain Name means, let's be serious :)


 On 1/10/07, *Issac Goldstand* [EMAIL PROTECTED]
 mailto:[EMAIL PROTECTED] wrote:

 I think the MSI should autogenerate a self-signed cert at least
(last
 thing we need is for people to deploy a static pre-distributed cert
 which would make it that much easier to do man-in-the-middle
attacks).

I agree, static keys are only for pure localhost-style examples, just a
bad
idea for something this flexible.  As far as a default selfsigned cert,
I was thinking of using the server name they filled in already as it
stands,
and let them replace it with a worthwhile one.

 Would be great if the MSI had a choice to use an existing cert, or
 generate a new one with a user supplied DN (fill-in fields for CN,
OU, O
 , L, ST, C), and generated a self-signed cert with that + a .csr for
 sending to a Trusted Third-Party for signing.

 Would also be great if there was some GUI for importing a signed
cert
 post-install, similar to the IIS wizard, but that's probably pushing
it.

Well, there are dozens of utilities out there that do that, I'm not
compelled
in the least to add it to the httpd package.

Justin Erenkrantz wrote:

 I'd prefer to just point them at the instructions for generating their
 own key rather than us distributing a 'fake' one.  -- justin

./configure; make; make install

We don't deposit a certificate today for Unix.  After considering this a
bit
more, I agree with jerenkrantz.



True... if you don't enable mod_ssl by default and add a note in the conf
file It should be rather safe to not include a cert. Pointing them to a docs
or wiki guide/how to would be a good idea.


At least, initially.  I'd rather see something out the door, with all the

appropriate comments in the user community of the best way (in their
opinion)
to proceed.

Then if we really believe the server install should do something to either
help deposit a cert/key for their server, or a post-install command should
be provided for this purpose, then we should ensure win and unix are
offering
the exact same facility.

Does this sound sane?



Yes  it does sound sane ;)


--
~Jorge


Re: 2.2.4 windows binary w/ssl?

2007-01-10 Thread Ruediger Pluem


On 01/10/2007 10:40 PM, William A. Rowe, Jr. wrote:

 
 Does this sound sane?

+1

Regards

RĂ¼diger