Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Kaspar Brand
On 26.05.2015 10:33, Rainer Jung wrote: > I find it questionable. I would find it more natural to embed the params > in the cert files they apply to, so e.g. the DH params in the RSA cert > file and the EC params in the ECDH cert file and also to not require a > special order for the files which

Re: mod_proxy_fcgi default port

2015-05-26 Thread Tim Bannister
How about asking IANA to assign a port? -- Tim Bannister – is...@c8h10n4o2.org.uk

Re: SSL/TLS best current practice

2015-05-26 Thread Andy Wang
On 05/26/2015 11:25 AM, William A Rowe Jr wrote: On Tue, May 26, 2015 at 10:45 AM, Yann Ylavic mailto:ylavic@gmail.com>> wrote: On Tue, May 26, 2015 at 5:29 PM, Andy Wang mailto:aw...@ptc.com>> wrote: > >> # SSL Cipher Suite: >> # List the ciphers that the client is

Re: SSL/TLS best current practice

2015-05-26 Thread William A Rowe Jr
On Tue, May 26, 2015 at 10:45 AM, Yann Ylavic wrote: > On Tue, May 26, 2015 at 5:29 PM, Andy Wang wrote: > > > >> # SSL Cipher Suite: > >> # List the ciphers that the client is permitted to negotiate. > >> # See the mod_ssl documentation for a complete list. > >> SSLCipherSuite HIGH:MEDIUM

Re: SSL/TLS best current practice

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 5:29 PM, Andy Wang wrote: > > >> --- >> >> # SSL Cipher Suite: >> # List the ciphers that the client is permitted to negotiate. >> # See the mod_ssl documentation for a complete list. >> SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4 >> SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4

Re: httpd - side channel attack - timing of digest comparisons

2015-05-26 Thread Dirk-Willem van Gulik
> On 26 May 2015, at 17:22, Dirk-Willem van Gulik wrote: .. > So I think that what is needed are two (or three) functions ... > - A string comparison function; where at least one string is is under > control of the attacker. Now the issue here is that length is every easily revealed. So I c

Re: SSL/TLS best current practice

2015-05-26 Thread Andy Wang
--- # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. # See the mod_ssl documentation for a complete list. SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4 SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4 !aNULL isn't needed?

Re: httpd - side channel attack - timing of digest comparisons

2015-05-26 Thread Dirk-Willem van Gulik
Folks, Did a scan through a fair bit of our code. mod_digest is not the only place; e.g. in basic auth; we are also not as careful in all cases as we could be. So I think that what is needed are two (or three) functions - A fairly mundane (binary) timing safe compare that compares two fi

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 2:26 PM, Yann Ylavic wrote: > On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing > wrote: >> Thanks for the many answers! >> >> Now, can I win someone over to propose backporting the mod_ssl ALPN changes? > > Proposed in r1681749 by also including r1681741 (CHANGES entry) an

Re: 2.4 release backport list

2015-05-26 Thread Stefan Eissing
Thanks Yann! > Am 26.05.2015 um 14:26 schrieb Yann Ylavic : > > On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing > wrote: >> Thanks for the many answers! >> >> Now, can I win someone over to propose backporting the mod_ssl ALPN changes? > > Proposed in r1681749 by also including r1681741 (CHAN

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing wrote: > Thanks for the many answers! > > Now, can I win someone over to propose backporting the mod_ssl ALPN changes? Proposed in r1681749 by also including r1681741 (CHANGES entry) and r1681746 (revert on HTML docs changes). There is no vote for

Re: svn commit: r1676004 - in /httpd/httpd/trunk: docs/manual/mod/ modules/ssl/

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 2:03 PM, Yann Ylavic wrote: > On Sat, Apr 25, 2015 at 11:46 AM, wrote: >> Author: kbrand >> Date: Sat Apr 25 09:46:09 2015 >> New Revision: 1676004 >> >> URL: http://svn.apache.org/r1676004 >> Log: >> Remove NPN support and focus on ALPN (RFC 7301) > [] >> >> Modified: >>

Re: svn commit: r1676004 - in /httpd/httpd/trunk: docs/manual/mod/ modules/ssl/

2015-05-26 Thread Stefan Eissing
Good catch. Was done in r1676004 and reverted in r1681746. The latter slipped through my NPN/ALPN sieve. So, basically the html changes should be removed from the patch. //Stefan > Am 26.05.2015 um 14:03 schrieb Yann Ylavic : > > On Sat, Apr 25, 2015 at 11:46 AM, wrote: >> Author: kbrand >>

Re: svn commit: r1676004 - in /httpd/httpd/trunk: docs/manual/mod/ modules/ssl/

2015-05-26 Thread Yann Ylavic
On Sat, Apr 25, 2015 at 11:46 AM, wrote: > Author: kbrand > Date: Sat Apr 25 09:46:09 2015 > New Revision: 1676004 > > URL: http://svn.apache.org/r1676004 > Log: > Remove NPN support and focus on ALPN (RFC 7301) [] > > Modified: > httpd/httpd/trunk/docs/manual/mod/directives.html.en > htt

mod_proxy_fcgi default port

2015-05-26 Thread Jan Kaluža
Hi, currently the port for fcgi:// protocol defaults to 8000. Is there any reason why we use this port number as a default? Also, I think this default port number is not documented anywhere. I'm asking, because php-fpm uses port 9000 by default. I know that these ports are not standardized a

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing wrote: > > Now, can I win someone over to propose backporting the mod_ssl ALPN changes? [to committers] Who goes? It would be funny to have 4 proposals though... :)

Re: 2.4 release backport list

2015-05-26 Thread Stefan Eissing
Thanks for the many answers! Now, can I win someone over to propose backporting the mod_ssl ALPN changes? I have prepared something: * mod_ssl: add ALPN support by allowing other modules to register callbacks for negotiation of the application layer protocol. trunk patch: http:/

Re: 2.4 release backport list

2015-05-26 Thread Stefan Eissing
Flattery! (I experience I am not immune to this…) Thanks for all the replies! I am currently making a patch that contains all the ALPN changes from trunk and works in 2.4. Hope that someone then can include this as proposal in the 2.4.13 STATUS. May it find votes! Back soonish... > Am 26.05.2

Re: 2.4 release backport list

2015-05-26 Thread Rainer Jung
Am 26.05.2015 um 11:07 schrieb Yann Ylavic: Oups, several simultaneous responses... That shows how much we like him (his work) :)

Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Rainer Jung
Am 26.05.2015 um 11:00 schrieb Tim Bannister: On 26 May 2015, at 09:37, Reindl Harald wrote: Am 26.05.2015 um 10:33 schrieb Rainer Jung: Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented "DH and ECDH paramete

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
Oups, several simultaneous responses... Hope too much information does not kill the information :p On Tue, May 26, 2015 at 11:03 AM, Yann Ylavic wrote: > Hi Stefan, > > On Tue, May 26, 2015 at 10:37 AM, Stefan Eissing > wrote: >> Sorry, if this question has an obvious answer which I was unable t

Re: 2.4 release backport list

2015-05-26 Thread Nick Kew
On Tue, 26 May 2015 10:37:28 +0200 Stefan Eissing wrote: > Sorry, if this question has an obvious answer which I was unable to find: > where would I find a list of the changes that will be backported to the > 2.4.13 release in order to see if a change has received enough votes? The file STATUS

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
Hi Stefan, On Tue, May 26, 2015 at 10:37 AM, Stefan Eissing wrote: > Sorry, if this question has an obvious answer which I was unable to find: > where would I find a list of the changes that will be backported to the > 2.4.13 release in order to see if a change has received enough votes? Backp

Re: 2.4 release backport list

2015-05-26 Thread Rainer Jung
Hi Stefan, Am 26.05.2015 um 10:37 schrieb Stefan Eissing: Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has received enough votes? The backports that

Re: 2.4 release backport list

2015-05-26 Thread Graham Leggett
On 26 May 2015, at 10:37 AM, Stefan Eissing wrote: > Sorry, if this question has an obvious answer which I was unable to find: > where would I find a list of the changes that will be backported to the > 2.4.13 release in order to see if a change has received enough votes? Look in the STATUS f

Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Tim Bannister
On 26 May 2015, at 09:37, Reindl Harald wrote: > > > Am 26.05.2015 um 10:33 schrieb Rainer Jung: >> Current mod_ssl code tries to read embedded DH and ECC parameters only from >> the first certificate file. Although this is documented >> >> "DH and ECDH parameters, however, are only read from

2.4 release backport list

2015-05-26 Thread Stefan Eissing
Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has received enough votes? Thanks. //Stefan bytes GmbH Hafenweg 16, 48155 Münster, Germany Phone: +49 251

Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Reindl Harald
Am 26.05.2015 um 10:33 schrieb Rainer Jung: Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented "DH and ECDH parameters, however, are only read from the first SSLCertificateFile directive, as they are applied indepe

mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Rainer Jung
Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented "DH and ECDH parameters, however, are only read from the first SSLCertificateFile directive, as they are applied independently of the authentication algorithm typ

Re: Two questions on mod_ssl source code details

2015-05-26 Thread Rainer Jung
Am 22.05.2015 um 18:35 schrieb Yann Ylavic: On Fri, May 22, 2015 at 6:29 PM, Rainer Jung wrote: 1) In other code I see EC_KEY_free(ecdh); after EC_KEY *ecdh = EC_KEY_new_by_curve_name(...) and using ecdh, e.g. in SSL_CTX_set_tmp_ecdh(mctx->ssl_ctx, eckey); Should we add the free?