Re: expose SSL_SHARED_CIPHERs from SSL/TLS

2023-03-06 Thread Dirk-Willem van Gulik
> On 6 Mar 2023, at 13:32, Ruediger Pluem wrote: > > > > On 3/6/23 12:35 PM, Dirk-Willem van Gulik wrote: >> I was cleaning up some of our private code - and came across the patch below >> - exposing the SHARED_CHIPHERs. >> >> We scratch this itch in

expose SSL_SHARED_CIPHERs from SSL/TLS

2023-03-06 Thread Dirk-Willem van Gulik
I was cleaning up some of our private code - and came across the patch below - exposing the SHARED_CHIPHERs. We scratch this itch in a few places to help force (or prevent) the forcing of a protocol upgrade from application land. No idea how common that is - any reason not to submit this as a s

Extra bucket brigade with just an EOS on an input filter at the end.

2021-08-07 Thread Dirk-Willem van Gulik
In some code (https://source.redwax.eu/svn/redwax/rs/mod_cms_verify/trunk/mod_cms_verify.c) I have in input filter (that checks a PKCS#7 signature before passing the payload on to a proxy/cgi-script, etc). I am testing this with: echo "field1=foo&field2=bar” |\ openssl

Re: child exit on self-proxy

2021-07-15 Thread Dirk-Willem van Gulik
On 14 Jul 2021, at 23:47, Yann Ylavic wrote: > On Wed, Jul 14, 2021 at 3:42 PM Yann Ylavic wrote: >> >> On Tue, Jul 13, 2021 at 4:16 PM Stefan Eissing >> wrote: >>> >>> In Yann's v3 of the patch, it triggers only when I stop the server while >>> the test case is ongoing, >> >> OK thanks, I

Re: svn commit: r1875516 - /httpd/httpd/branches/2.4.x/STATUS

2020-03-22 Thread Dirk-Willem van Gulik
Thank you so much for finding is! This one has been plaguing us for quite a bit - and we where totally looking in the wrong place. Dw. > On 22 Mar 2020, at 13:12, gbec...@apache.org wrote: > > Author: gbechis > Date: Sun Mar 22 12:12:21 2020 > New Revision: 1875516 > > URL: http://svn.apache

Re: Netcraft

2020-02-21 Thread Dirk-Willem van Gulik
Jim, On 21 Feb 2020, at 13:20, Jim Jagielski wrote: > Wow. Was Netcraft actually somewhat kind to Apache httpd? They actually > admitted some areas where httpd is doing better, and still does better, > market-share wise, than nginx. They are very kind (and professional) people. And the pub i

Re: "Most Popular Web Server?"

2018-04-19 Thread Dirk-Willem van Gulik
On 19 Apr 2018, at 12:09, Graham Leggett wrote: > On 18 Apr 2018, at 10:46 PM, Mark Blackman wrote: > >> Is most popular the right thing to aim for? I would advise continuing to >> trade on Apache’s current strengths (versatility and documentation for me >> and relative stability) and let the

Re: BalancerMember and RFC1035 compliance - BalancerMember worker hostname (65-character.long.DNS.name.com) too long

2018-02-07 Thread Dirk-Willem van Gulik
> On 7 Feb 2018, at 16:24, Graham Leggett wrote: > > On 07 Feb 2018, at 5:18 PM, Graham Leggett wrote: > >> Looking back through the archives, looks like that backport was already >> accepted: >> >> http://svn.apache.org/viewvc?view=revision&revision=1634520 > > Hmmm… it’s actually only sol

Re: New ServerUID directive

2018-02-02 Thread Dirk-Willem van Gulik
> On 2 Feb 2018, at 15:44, Stefan Eissing wrote: > > > >> Am 02.02.2018 um 15:42 schrieb Yann Ylavic : >> >> On Fri, Feb 2, 2018 at 3:25 PM, Plüm, Rüdiger, Vodafone Group >> wrote:> >>> -Ursprüngliche Nachricht- Von: Jim Jagielski [mailto:j...@jagunet.com] Gesendet: Freita

Re: SSL and Usability and Safety

2017-05-03 Thread Dirk-Willem van Gulik
> On 3 May 2017, at 15:14, Issac Goldstand wrote: > > On 5/3/2017 3:59 PM, Dirk-Willem van Gulik wrote: >> >>> On 3 May 2017, at 14:53, Issac Goldstand >> <mailto:mar...@beamartyr.net>> wrote: >>> >>> On 5/3/2017 12:46 PM, Dirk-Wi

Re: SSL and Usability and Safety

2017-05-03 Thread Dirk-Willem van Gulik
> On 3 May 2017, at 14:53, Issac Goldstand wrote: > > On 5/3/2017 12:46 PM, Dirk-Willem van Gulik wrote: >> On 3 May 2017, at 10:03, Issac Goldstand wrote: >>> >>> +1 on the idea >>> >>> So far I'm -0 about all of the proposed impl

Re: SSL Policy Definitions

2017-05-03 Thread Dirk-Willem van Gulik
> On 3 May 2017, at 14:09, Graham Leggett wrote: > > On 03 May 2017, at 2:01 PM, Stefan Eissing > wrote: > >> We seem to all agree that a definition in code alone will not be good >> enough. People need to be able to see what is actually in effect. > > I think we’re overthinking this. > >

Re: SSL and Usability and Safety

2017-05-03 Thread Dirk-Willem van Gulik
On 3 May 2017, at 10:03, Issac Goldstand wrote: > > +1 on the idea > > So far I'm -0 about all of the proposed implementations for 2 reasons: > > 1) Mr and Mrs normal (whom are our primary customers in the original > proposal) usually download Apache from their distro or some other > binary. T

Re: SHA-256

2017-02-24 Thread Dirk-Willem van Gulik
On 24 Feb 2017, at 18:52, Jim Jagielski wrote: > > I think we should start, in addition to "signing" w/ md5 and sha-1, > using sha-256 as well. > > Sound OK? That seems to match the advice of NIST, E-CRYPT and the BSI on https://www.nrc.nl/nieuws/2017/02/24/zelfrijdende-auto-google-ub

Re: rfc7231 - content-md5

2017-01-20 Thread Dirk-Willem van Gulik
> On 20 Jan 2017, at 21:13, William A Rowe Jr wrote: > > On Fri, Jan 20, 2017 at 1:49 PM, William A Rowe Jr > wrote: >> On Fri, Jan 20, 2017 at 1:21 PM, Dirk-Willem van Gulik >> wrote: >>> RFC 7231 has retired Content-MD5. >>> >>> Fai

Re: rfc7231 - content-md5

2017-01-20 Thread Dirk-Willem van Gulik
On 20 Jan 2017, at 20:49, William A Rowe Jr wrote: > > Note that https://www.rfc-editor.org/rfc/rfc7616.txt still provides > for MD5 hashed > digest auth keys. So removing this altogether will break mod_auth_digest in a > manner that breaks existing user auth. > > > Note that https://www.rfc-e

Re: rfc7231 - content-md5

2017-01-20 Thread Dirk-Willem van Gulik
> On 20 Jan 2017, at 20:49, William A Rowe Jr wrote: > > On Fri, Jan 20, 2017 at 1:21 PM, Dirk-Willem van Gulik > wrote: >> RFC 7231 has retired Content-MD5. >> >> Fair game to remove it from -trunk - or make it squeek 'debrecated' at WARN >> o

rfc7231 - content-md5

2017-01-20 Thread Dirk-Willem van Gulik
RFC 7231 has retired Content-MD5. Fair game to remove it from -trunk - or make it squeek 'debrecated' at WARN or INFO and retire it at the next minor release ? Dw.

Re: mod_lets-encrypt

2017-01-15 Thread Dirk-Willem van Gulik
> On 14 Jan 2017, at 22:31, William A Rowe Jr wrote: > > On Sat, Jan 14, 2017 at 12:15 PM, Dirk-Willem van Gulik > wrote: >> >> On 14 Jan 2017, at 19:05, William A Rowe Jr wrote: >> >> Any mod_letsencrypt can provision the certs but needs to do so &

Re: mod_lets-encrypt

2017-01-15 Thread Dirk-Willem van Gulik
> On 14 Jan 2017, at 20:05, Stefan Sperling wrote: > > On Sat, Jan 14, 2017 at 07:15:29PM +0100, Dirk-Willem van Gulik wrote: >> In fact - that may be a nice feature - an, essential, empheral port. > > Would that work for web servers behind firewalls? No; would not exp

Re: mod_lets-encrypt

2017-01-14 Thread Dirk-Willem van Gulik
> On 14 Jan 2017, at 19:05, William A Rowe Jr wrote: > > On Sat, Jan 14, 2017 at 10:22 AM, Eric Covener wrote: >> On Sat, Jan 14, 2017 at 11:19 AM, Eric Covener wrote: >>> >>> I think if a feature/directive will turn on something that will write >>> to configured keystores, it really shouldn'

Re: mod_lets-encrypt

2017-01-14 Thread Dirk-Willem van Gulik
(reshuffled top post) On 14 Jan 2017, at 16:07, Rich Bowen wrote: > On Jan 10, 2017 12:15 PM, "Jacob Champion" <mailto:champio...@gmail.com>> wrote: > On 01/10/2017 08:35 AM, Dirk-Willem van Gulik wrote: > Before I send someone into the woods - did anyone consider/do

mod_lets-encrypt

2017-01-10 Thread Dirk-Willem van Gulik
Before I send someone into the woods - did anyone consider/do a quick ‘mod_lets_encrypt’ (with or without a persistent store) — that requires virtually no configuration ? Or is the web world still thinking unix with clear small concise scripts that do one thing well ? Dw

Re: EC to audit Apache HTTP Server

2016-07-24 Thread Dirk-Willem van Gulik
On 22 Jul 2016, at 18:59, Steffen wrote: > > See https://joinup.ec.europa.eu/node/153614 I think I’ve gotten the right people at the EC to know that d Eric Covener (cove...@apache.org) as the Chair of HTTPD is the right starting place should they want a proper conversation. Dw (who once upon

Re: svn commit: r1750779 - in /httpd/httpd/trunk: CHANGES modules/ssl/ssl_engine_kernel.c

2016-06-30 Thread Dirk-Willem van Gulik
That is my reading as well - +1. > On 30 Jun 2016, at 18:38, Jim Jagielski wrote: > > +1 > >> On Jun 30, 2016, at 11:38 AM, Stefan Eissing >> wrote: >> >> We now set exactly the same callback right before in line 709. If we had >> more than one callback, we would not have to specify NULL, b

Odd SSLProxyCheckPeerCN behaviour

2016-02-17 Thread Dirk-Willem van Gulik
Was looking into a report that something could get a lift on websocket with a specific AltSubject trickery; but got into jak shaving - where I cannot work out why SSLProxyCheckPeerCN et.al. get ignored. The most trivial config I could find to reproduce is: Listen 123.123.123.123:4321

Re: Buffer size in mod_session_crypto.c, decrypt_string()

2015-11-19 Thread Dirk-Willem van Gulik
> On 19 Nov 2015, at 10:07, Ewald Dieterich wrote: > > This is from mod_session_crypto.c, decrypt_string(): > >/* strip base64 from the string */ >decoded = apr_palloc(r->pool, apr_base64_decode_len(in)); >decodedlen = apr_base64_decode(decoded, in); >decoded[decodedlen] = '\0';

Good at assembler ? (Was:httpd - side channel attack - timing of digest comparisons)

2015-05-29 Thread Dirk-Willem van Gulik
>>> On 28 May 2015, at 17:03, William A Rowe Jr >> <mailto:wr...@rowe-clan.net>> wrote: …. >>> > > On 26 May 2015, at 17:22, Dirk-Willem van Gulik >> > > <mailto:di...@webweaving.org>> wrote: >>> > .. >>> > >

Re: httpd - side channel attack - timing of digest comparisons

2015-05-28 Thread Dirk-Willem van Gulik
> On 28 May 2015, at 17:24, Dirk-Willem van Gulik wrote: > > >> On 28 May 2015, at 17:03, William A Rowe Jr > <mailto:wr...@rowe-clan.net>> wrote: >> >> >> On May 26, 2015 10:31 AM, "Dirk-Willem van Gulik" > <mailto:di...@webw

Re: httpd - side channel attack - timing of digest comparisons

2015-05-28 Thread Dirk-Willem van Gulik
> On 28 May 2015, at 17:03, William A Rowe Jr wrote: > > > On May 26, 2015 10:31 AM, "Dirk-Willem van Gulik" <mailto:di...@webweaving.org>> wrote: > > > > > > > On 26 May 2015, at 17:22, Dirk-Willem van Gulik > > <mailto:di...

Re: mod_h2 internals

2015-05-28 Thread Dirk-Willem van Gulik
> On 28 May 2015, at 16:25, Jim Jagielski wrote: > > One thing I've been thinking about, and there might even be some hooks > in trunk for it, is the idea of slave connections (or sub-connections) > which kind of *is* a pseudo connection. So one could create a connection > and then a sub/slave c

Re: httpd - side channel attack - timing of digest comparisons

2015-05-26 Thread Dirk-Willem van Gulik
> On 26 May 2015, at 17:22, Dirk-Willem van Gulik wrote: .. > So I think that what is needed are two (or three) functions ... > - A string comparison function; where at least one string is is under > control of the attacker. Now the issue here is that length is every easily re

Re: httpd - side channel attack - timing of digest comparisons

2015-05-26 Thread Dirk-Willem van Gulik
Folks, Did a scan through a fair bit of our code. mod_digest is not the only place; e.g. in basic auth; we are also not as careful in all cases as we could be. So I think that what is needed are two (or three) functions - A fairly mundane (binary) timing safe compare that compares two fi

Re: httpd - side channel attack - timing of digest comparisons

2015-05-21 Thread Dirk-Willem van Gulik
Very quick and dirty list of the most obvious places where we compare stuff. Currently trying to find some time to figure out if these are all vulnerable; or if it is just the two outer ones. Dw. Index: modules/aaa/mod_auth_digest.c ==

httpd - side channel attack - timing of digest comparisons

2015-05-21 Thread Dirk-Willem van Gulik
Folks, security@ got a notification of a potential side channel attack. The original message is below (sans details on the poster who wants to remain private). In short - we’re comparing the digest in mod-auth-digest in a manner that may reveal how much is actually correct; leading potentially

Re: Style checker?

2015-05-21 Thread Dirk-Willem van Gulik
> I still develop in what a lot of folks would consider a fairly "primitive" > environment (vi) that doesn't do anything for style checking things like line > width/spacing before and after control statements/indentation/variable > declaration/etc. I know of the indent tool available on most un

Re: Version check idea

2015-04-21 Thread Dirk-Willem van Gulik
On 21 Apr 2015, at 15:55, Jim Jagielski wrote: > For comment: What do people think about adding the capability that > when httpd is started, it tries to access http://httpd.apache.org/doap.rdf > to check its version number with the latest one referred to in that > file and, if a newer one exists,

Re: [Patch] mod_ssl SSL_CLIENT_CERT_SUBJECTS - access to full client certificate chain

2014-11-06 Thread Dirk-Willem van Gulik
> On 06 Nov 2014, at 14:14, Andreas B. wrote: > > Am 06.11.2014 um 08:34 schrieb Dirk-Willem van Gulik: >>> On 06 Nov 2014, at 07:05, Kaspar Brand >>> <mailto:httpd-dev.2...@velox.ch> wrote: >>> >>>> 11.3.1 Certificate exact mat

Re: [Patch] mod_ssl SSL_CLIENT_CERT_SUBJECTS - access to full client certificate chain

2014-11-05 Thread Dirk-Willem van Gulik
> On 06 Nov 2014, at 07:05, Kaspar Brand wrote: > >> 11.3.1 Certificate exact match >> … >> CertificateExactAssertion ::= SEQUENCE { >> serialNumber CertificateSerialNumber, >> issuerName } ... > (i.e., we are again back at the point that uniqueness of an X.509 > certificate

Fwd: CVE-2014-3671: DNS Reverse Lookup as a vector for the Bash vulnerability (CVE-2014-6271 et.al.)

2014-10-13 Thread Dirk-Willem van Gulik
> Date: 13 Oct 2014 12:03:26 CEST > From: Dirk-Willem van Gulik > To: di...@webweaving.org > Subject: CVE-2014-3671: DNS Reverse Lookup as a vector for the Bash > vulnerability (CVE-2014-6271 et.al.) > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > >

Re: PROXY_WORKER_MAX_NAME_SIZE

2014-08-29 Thread Dirk-Willem van Gulik
> On 29 Aug 2014, at 21:05, Jim Jagielski wrote: > > FWIW, this is reported in > >https://issues.apache.org/bugzilla/show_bug.cgi?id=53218 > > I was thinking of a dual-approach: Increase PROXY_WORKER_MAX_NAME_SIZE > and making the truncation of the worker name (s->name) non-fatal > (but lo

Re: Odd - SSLCipherSuite

2014-05-19 Thread Dirk-Willem van Gulik
Op 19 mei 2014, om 15:04 heeft Dirk-Willem van Gulik het volgende geschreven: > Op 17 mei 2014, om 14:15 heeft Dr Stephen Henson > het volgende geschreven: >> On 14/05/2014 10:23, Dirk-Willem van Gulik wrote: >>> Now I must be getting rusty - we ha

Re: Odd - SSLCipherSuite

2014-05-19 Thread Dirk-Willem van Gulik
Op 17 mei 2014, om 14:15 heeft Dr Stephen Henson het volgende geschreven: > On 14/05/2014 10:23, Dirk-Willem van Gulik wrote: >> Now I must be getting rusty - we have in the config file >> >> SSLCipherSuite -ALL:ECDHE-RSA-AES256-SHA >> SSLProtocol -ALL +TLSv1.1 +TLS

Re: Odd - SSLCipherSuite

2014-05-16 Thread Dirk-Willem van Gulik
oes this ring a bell? Dw. > Von: Dirk-Willem van Gulik [mailto:di...@webweaving.org] > Gesendet: Mittwoch, 14. Mai 2014 11:23 > An: dev@httpd.apache.org > Betreff: Odd - SSLCipherSuite > > Now I must be getting rusty - we have in the config file > > SSLCipherSuit

Odd - SSLCipherSuite

2014-05-14 Thread Dirk-Willem van Gulik
Now I must be getting rusty - we have in the config file SSLCipherSuite -ALL:ECDHE-RSA-AES256-SHA SSLProtocol -ALL +TLSv1.1 +TLSv1.2 +SSLv3 with the first resolving nicely with openssl ciphers -ALL:ECDHE-RSA-AES256-SHA to just ECDHE-RSA-AES256-SHA So my assumpt

Re: AuthBasicProvider ssl-client-cert?

2013-09-08 Thread Dirk-Willem van Gulik
Op 21 jul. 2013, om 20:58 heeft Graham Leggett het volgende geschreven: > On 17 Jul 2013, at 4:44 PM, Eric Covener wrote: > >> All of the client-cert-as-basic-auth-substitute mechanisms we have >> require you to check the dummy password with a "real" >> authbasicprovider. That is not quite t

Re: breach attack

2013-08-20 Thread Dirk-Willem van Gulik
Op 12 aug. 2013, om 01:35 heeft Eric Covener het volgende geschreven: > > > What do you think of including a header? Is there a way to find out > > from the encrypted traffic where the header ends and where the body > > starts? > > For a typical request they are in separate SSL records and so

Re: breach attack

2013-08-20 Thread Dirk-Willem van Gulik
Op 10 aug. 2013, om 21:35 heeft Reindl Harald het volgende geschreven: > > IMHO that is all the wrong train > > "victim's browser to visit the targeted website thousands of times" > for me says clearly that a proper server with rate-controls based > on iptable sor a firewall in front of the ma

Re: breach attack

2013-08-10 Thread Dirk-Willem van Gulik
On 10 Aug 2013, at 18:14, "Steinar H. Gunderson" wrote: > On Sat, Aug 10, 2013 at 06:11:09PM +0200, Dirk-Willem van Gulik wrote: >> I'd keep in mind that compression is simply an amplifier for this type of >> attack. It makes the approach more effective. But it

Re: breach attack

2013-08-10 Thread Dirk-Willem van Gulik
On 10 Aug 2013, at 00:37, Eric Covener wrote: > On Fri, Aug 9, 2013 at 5:24 PM, Steinar H. Gunderson > wrote: >> On Tue, Aug 06, 2013 at 01:32:00PM -0400, Eric Covener wrote: >>> Another option in this neighborhood is small/varying deflate blocks. >>> But that probably limits the usefulness of

Re: DOS-Protection: RequestReadTimeout-like option missing

2013-05-23 Thread Dirk-Willem van Gulik
On 11 May 2013, at 20:26, Reindl Harald wrote: > after the connection is established and in case of connect > you have already passed the TCP transmissions and kernel > settings like > > net.ipv4.tcp_fin_timeout = 5 > net.ipv4.tcp_retries1 = 5 > net.ipv4.tcp_syn_retries = 5 > net.ipv4.tcp_synac

Re: URL scanning by bots

2013-05-03 Thread Dirk-Willem van Gulik
On 3 mei 2013, at 10:55, Marian Marinov wrote: > > If Apache by default delays 404s, this may have some effect in the first > month or two after the release of this change. But then the the botnet > writers will learn and update their software. > I do believe that these guys are monitoring mai

Re: URL scanning by bots

2013-05-01 Thread Dirk-Willem van Gulik
I think we're mixing three issues 1) Prevent Starvation. protecting a server from server side/machine starvation (i.e. running out of file descriptors, sockets, mbuf's, whatever). So here you are in the domain where there is no argument in terms of protocol violation/bad c

Re: URL scanning by bots

2013-05-01 Thread Dirk-Willem van Gulik
On 1 mei 2013, at 13:31, Graham Leggett wrote: > > The evidence was just explained - a bot that does not get an answer quick > enough gives up and looks elsewhere. > The key words are "looks elsewhere". For what it is worth - I've been experimenting with this (up till about 6 months ago) on a

Re: Small things to do

2011-11-08 Thread Dirk-WIllem van Gulik
On 8 Nov 2011, at 23:03, Daniel Ruggeri wrote: > On 11/8/2011 3:10 PM, Stefan Fritsch wrote: > > * mod_ssl's proxy support only allows one proxy client certificate per > > frontend virtual host. Lift this restriction. > > jim sez: Why a blocker?, pgollucci +1 jim > > wrowe asks: wha

Re: Another regression regarding byteranges

2011-09-01 Thread Dirk-Willem van Gulik
On 1 Sep 2011, at 13:33, Jim Jagielski wrote: > > On Sep 1, 2011, at 6:31 AM, Plüm, Rüdiger, VF-Group wrote: >> I already fixed that in trunk. >> I think this regression justifies another release for 2.2.x. But IMHO we >> should wait at least until >> mid next week to see if other regressions c

Re: Next update

2011-09-01 Thread Dirk-Willem van Gulik
On 1 Sep 2011, at 12:06, Ben Laurie wrote: > On Wed, Aug 31, 2011 at 9:03 PM, Dirk-WIllem van Gulik > wrote: >> Suggestion for >> >>http://people.apache.org/~dirkx/CVE-2011-3192.txt > > You probably mean "deprecated" not "desecrated&quo

Re: Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x (CVE-2011-3192)

2011-08-31 Thread Dirk-WIllem van Gulik
Folks, See below - for the 1.3 discussion - that suggest we should take it a notch down: On 31 Aug 2011, at 22:35, Munechika Sumikawa wrote: We're currently discussing this - and will propably adjust the announcement a bit. It is vulnerable in that it can suddenly take a lot more

vote for FINAL announce

2011-08-31 Thread Dirk-WIllem van Gulik
On 31 Aug 2011, at 21:07, Dirk-WIllem van Gulik wrote: >> http://people.apache.org/~dirkx/CVE-2011-3192.txt Off to bed now. If there is consensus we are 'done' then a vote on either of these options would be of use 1 as above 2 as above but with complete rev

Re: Next update

2011-08-31 Thread Dirk-WIllem van Gulik
On 31 Aug 2011, at 21:03, Dirk-WIllem van Gulik wrote: > Suggestion for > > http://people.apache.org/~dirkx/CVE-2011-3192.txt > > to be sent to announce and the usual security places. > > ->Comments on weaken/strenghten 1.3 text > > Happy to

Re: Next update

2011-08-31 Thread Dirk-WIllem van Gulik
Suggestion for http://people.apache.org/~dirkx/CVE-2011-3192.txt to be sent to announce and the usual security places. -> Comments on weaken/strenghten 1.3 text Happy to completely recant that it was vulnerable. Or happy to keep a bit of a warning in there. -> Lots o

Re: Next update

2011-08-31 Thread Dirk-WIllem van Gulik
On 26 Aug 2011, at 18:05, William A. Rowe Jr. wrote: > On 8/26/2011 11:41 AM, Eric Covener wrote: >> Should we bump the "5"'s in the draft advisory and/or code to a more >> liberal #? At the very least for the 2.0 rewrite solution that will >> return forbidden instead of full content? > > Can w

Re: Next update

2011-08-31 Thread Dirk-WIllem van Gulik
On 31 Aug 2011, at 18:20, William A. Rowe Jr. wrote: > Note some additional improvements for a 'final' update 3 advisory… Ack! Draft coming in half an hour or so, Dw.

Wrapup -- Was: 2.2 approach for byterange?

2011-08-29 Thread Dirk-WIllem van Gulik
Folks, How do we wrap this up in what remains of the (US) day ? I can have ready a final draft or a 'more mitigation' draft - of the stay tuned type. Since Advisory update-2 I gotten about 5 emails with helpful (but small) improvements for what we have; 3 with some detailed feedback - and a

Re: svn commit: r1162560 - /httpd/httpd/trunk/modules/http/byterange_filter.c

2011-08-28 Thread Dirk-Willem van Gulik
On 28 Aug 2011, at 18:12, rpl...@apache.org wrote: > URL: http://svn.apache.org/viewvc?rev=1162560&view=rev > Log: > * Silence compiler warning > +apr_off_t pofft = 0; This may have been more than that - it fixes my testcase on FreeBSD with all optimizing set to max (OSX and Ubuntu where

Re: Next update

2011-08-26 Thread Dirk-Willem van Gulik
On 26 aug. 2011, at 18:35, Guenter Knauf wrote: > Hi Dirk, > Am 26.08.2011 12:44, schrieb Dirk-Willem van Gulik: >> 4) Deploy a Range header count module as a temporary stopgap measure: >> >>http://people.apache.org/~dirkx/mod_rangecnt.c > you have a c

Advisory improvement

2011-08-26 Thread Dirk-Willem van Gulik
From the Full Disclosure list. Does anyone have time to confirm this improvement. On 26 Aug 2011, at 12:09, Carlos Alberto Lopez Perez wrote: > RewriteEngine on > RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC,OR] > RewriteCond %{HTTP:request-range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$

Re: Next update

2011-08-26 Thread Dirk-Willem van Gulik
On 26 aug. 2011, at 10:47, Dirk-Willem van Gulik wrote: > Folks - as we're not quit there yet - I want to do sent out an updated > advisory at 11:00 UTC. We have enough new information and extra mitigations. > Will post the draft(s) to security@ this time. Apologies fo

Next update

2011-08-26 Thread Dirk-Willem van Gulik
Folks - as we're not quit there yet - I want to do sent out an updated advisory at 11:00 UTC. We have enough new information and extra mitigations. Will post the draft(s) to security@ this time. Secondly - I got below updates to the regex-es; to optimise the pcre expressions and remove the exha

CVE-2011-3192 - NeXT update ?

2011-08-25 Thread Dirk-WIllem van Gulik
your take ? Thanks, Dw. -- Dirk-Willem van Gulik.

Re: Truly minor inconsistency in mod_rangecnt.c

2011-08-25 Thread Dirk-Willem van Gulik
On 25 Aug 2011, at 15:53, Tom Evans wrote: > I wasn't sure whether to mail this in, it is inconsequential; the > module is supposed to count the number of ranges, but it actually > counts the number of commas between ranges, leading to an off-by-one. > IE, a request with 6 ranges would not be rej

Re: Fixing Ranges

2011-08-25 Thread Dirk-Willem van Gulik
On 25 Aug 2011, at 17:45, Greg Ames wrote: > On Thu, Aug 25, 2011 at 10:25 AM, Jim Jagielski wrote: > Now that the memory utilz is being fixed, we need to determine > what sort of usage we want to allow… I'm guessing that people > are ok with http://trac.tools.ietf.org/wg/httpbis/trac/ticket/311

Re: Fixing Ranges

2011-08-25 Thread Dirk-Willem van Gulik
On 25 Aug 2011, at 15:48, Plüm, Rüdiger, VF-Group wrote: > +1 for 2.3, -0 for 2.2. I guess for 2.2 we should only detect "misuse" (the > definition of misuse > needs to configurable) and reply with a 200 if misuse is detected. Ok - given the patch a good test - and actually - am not sure we nee

Re: Fixing Ranges

2011-08-25 Thread Dirk-Willem van Gulik
On 25 Aug 2011, at 12:40, Jim Jagielski wrote: > Tested and this does appear to both address the DoS as well as > reduce memory usage for "excessive" range requests… > > +1 for adding this no matter what. Yup - same here. Makes PDF serving a heck of a lot better too. Dw. > > On Aug 24, 2011,

Next update on CVE-2011-3192

2011-08-25 Thread Dirk-Willem van Gulik
I am keeping a draft at http://people.apache.org/~dirkx/CVE-2011-3192.txt Changes since last are: - version ranges more specific - vendor information added - backgrounder on relation to 2007 issues (see below to ensure I got this right). I suggest we sent this out lat

Re: Fixing Ranges

2011-08-24 Thread Dirk-Willem van Gulik
On 24 Aug 2011, at 22:16, Stefan Fritsch wrote: > I have another idea: Instead of using apr_brigade_partition write a > new function ap_brigade_copy_part that leaves the original brigade > untouched. It would copy the necessary buckets to a new brigade and > then split the first and last of those

Re: Final draft / CVE-2011-3192

2011-08-24 Thread Dirk-Willem van Gulik
Original Message - > From: "Dirk-Willem van Gulik" > Newsgroups: gmane.comp.apache.devel > To: ; > Sent: Wednesday, August 24, 2011 5:34 PM > Subject: Final draft / CVE-2011-3192 > > > Thanks for all the help. All fixes included. Below will go out to

Re: DoS with mod_deflate & range requests

2011-08-24 Thread Dirk-WIllem van Gulik
On 24 Aug 2011, at 21:39, Greg Ames wrote: > On Wed, Aug 24, 2011 at 3:19 PM, Jim Jagielski wrote: > > > > > If we only merge adjacent ascending ranges, then it seems like an attacker > > could just craft a header where the ranges jump around and dodge our fix. > > > > I think no matter what,

Re: Final draft / CVE-2011-3192

2011-08-24 Thread Dirk-WIllem van Gulik
That is fine - we can do another update tomorrow, say noon zulu - if we expect that we do not have a proper patch and/or a 2.0.65 / 2.2.20 in the day following. Weird though - my 2.0.61 and 64 does seem fine. So probably very early 2.0 series. Dw On 24 Aug 2011, at 20:40, Eric Covener wrote:

Re: DoS with mod_deflate & range requests

2011-08-24 Thread Dirk-Willem van Gulik
On 24 Aug 2011, at 16:35, Tim Bannister wrote: > On Tue, Aug 23, 2011, Roy T. Fielding wrote: >> And the spec says ... >> >> When a client requests multiple ranges in one request, the >> server SHOULD return them in the order that they appeared in the >> request. >> >> My suggestion is to

Final draft / CVE-2011-3192

2011-08-24 Thread Dirk-Willem van Gulik
Thanks for all the help. All fixes included. Below will go out to announce at the top of the hour - unless I see a veto. Dw. Title:CVE-2011-3192: Range header DoS vulnerability Apache HTTPD 1.3/2.x Apache HTTPD Security ADVISORY Date: 20110824 1600Z Product: Apache HTTPD W

Re: VOTES please -- CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (Final-6)

2011-08-24 Thread Dirk-Willem van Gulik
Various suggest on-list and off-list fixes applied. Thanks all. A few more +1's would be nice :) Dw. Title:CVE-2011-3192: Range header DoS vulnerability Apache HTTPD 1.3/2.x Apache HTTPD Security ADVISORY Date: 20110824 1600Z Product: Apache HTTPD Web Server Versions: Apa

Re: CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (NEAR FINAL DRAFT-4)

2011-08-24 Thread Dirk-Willem van Gulik
On 24 Aug 2011, at 15:34, Guenter Knauf wrote: > can you please apply: > --- mod_rangecnt.c.orig Wed Aug 24 16:25:34 2011 > +++ mod_rangecnt.cWed Aug 24 15:26:48 2011 Done. > which I need on NetWare in order to get ap_hook_post_read_request() proto; > > and maybe we should also add l

VOTES please -- CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (Final-5)

2011-08-24 Thread Dirk-Willem van Gulik
Folks, Can I have a few +1's on below - or feedback on what we'd like to have changed ? * Would like to get this out in an hour or so ? * FIne with the 48 hours commitment of an update ? Dw. Title:CVE-2011-3192: Range header DoS vulnerability Apache HTTPD 1.3/2.x Date: 20

Re: CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (NEAR FINAL DRAFT-4)

2011-08-24 Thread Dirk-WIllem van Gulik
On 24 Aug 2011, at 14:07, Dirk-WIllem van Gulik wrote: * Folks - do we also need to add Request-Range ? * Updated with Rudigers comments., Eric, Florians, Marks. * Consensus that the deflate stuff needs to go out reflected. * More Comments please. Esp. on the quality

Re: Mitigation Range header

2011-08-24 Thread Dirk-WIllem van Gulik
On 24 Aug 2011, at 14:01, Plüm, Rüdiger, VF-Group wrote: > Have you tried if the same happens with mod_deflate, but with one of the > the proposed mitigations in place? As soon as I reject/block on the range header - all is fine again. > As said my guess is that this might be an issue with mod_

Re: CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (DRAFT-3)

2011-08-24 Thread Dirk-WIllem van Gulik
* Folks - do we also need to add Request-Range ? * Updated with Rudigers comments., Eric, Florians * Consensus that the deflate stuff needs to go out reflected. * More Comments please. Esp. on the quality and realisticness of the mitigtions. * Is this the right li

Re: Mitigation Range header

2011-08-24 Thread Dirk-WIllem van Gulik
On 24 Aug 2011, at 13:43, Florian Weimer wrote: > * Dirk-WIllem van Gulik: > >> Hmm - when I remove mod_deflate (i.e. explicitly as it is the default >> in all our installs) and test on a / entry which is a static file >> which is large (100k)* - then I cannot get

Re: Mitigation Range header

2011-08-24 Thread Dirk-WIllem van Gulik
On 24 Aug 2011, at 13:22, Florian Weimer wrote: > * Plüm, Rüdiger, VF-Group: > >> As said this has *nothing* to do with mod_deflate. This was IMHO just >> a guess by the original author of the tool. > > This matches my testing, too. I see a significant peak in RAM usage on > a server where "ap

Re: CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (DRAFT-2)

2011-08-24 Thread Dirk-Willem van Gulik
* Updated with Rudigers comments. * Do we have consensus that the deflate stuff needs to go out - is not relevant ? * More Comments please. Esp. on the quality and realisticness of the mitigtions. Thanks, Title: CVE-2011-3192: Range header DoS vulnerability in Apache

Re: Mitigation Range header (Was: DoS with mod_deflate & range requests)

2011-08-24 Thread Dirk-Willem van Gulik
On 24 Aug 2011, at 12:57, Plüm, Rüdiger, VF-Group wrote: >> -> Where possible - disable mod_deflate >> >> => we sure this covers all cases - or this is a good stopgap ? > > As said this has *nothing* to do with mod_deflate. This was IMHO just > a guess by the original author of the

CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 (DRAFT)dev

2011-08-24 Thread Dirk-Willem van Gulik
Comments please. Esp. on the quality and realisticness of the mitigtions. Title: CVE-2011-3192: Range header DoS vulnerability in Apache 1.3 and Apache 2 Date: 20110824 1600Z # Last Updated: 20110824 1600Z Product: Apache Web Server Versions: Apache 1.3 all versions, Apache 2 all

CVE-2011-3192 (Was: CVE (Was: DoS with mod_deflate & range requests))

2011-08-24 Thread Dirk-Willem van Gulik
The new Range: header has been given the CVE of CVE-2011-3192 Please use that in subjects, commits and what not. Thanks, Dw. On 24 Aug 2011, at 09:28, Dirk-Willem van Gulik wrote: > Folks, > > Have we done (or who is doing a CVE) on this ? So we get immediate 'fixes&

Mitigation Range header (Was: DoS with mod_deflate & range requests)

2011-08-24 Thread Dirk-Willem van Gulik
Folks, This issue is now active in the wild. So some unified/simple comms is needed. What is the wisdom on mitigation advise/briefing until a proper fix it out - in order of ease: -> Where possible - disable mod_deflate => we sure this covers all cases - or this is a good

CVE (Was: DoS with mod_deflate & range requests)

2011-08-24 Thread Dirk-Willem van Gulik
Folks, Have we done (or who is doing a CVE) on this ? So we get immediate 'fixes' out like a tiny patch to count the comma's, a caveated LimitRequestFieldSize 100 or a clever Regex on %{HTTP_Range}. Or am I totally asleep and missed the CVE (as my google foo only nets me CVE-2005-2728 right no

SSLRenegBufferSize

2011-05-03 Thread Dirk-Willem van Gulik
Can anyone remember why SSLRenegBufferSize is set at 128k (131072 bytes) currently by default ? And if that is just an accidental default - or if deep thought has gone into it ? And what are the specific things which are likely to break if it is set significantly smaller* ? Thanks, Dw. *:

Bug #30865 -- mod_disk_cache leaves many temporary files slowing file system

2011-02-27 Thread Dirk-Willem van Gulik
Reudiger, Why is: https://issues.apache.org/bugzilla/show_bug.cgi?id=30865 still open ? You are not sure it was fixed ? Or we just forgot about it ? Thanks, Dw.

Re: FOSDEM

2011-02-01 Thread Dirk-WIllem van Gulik
On 1 Feb 2011, at 22:17, Jorge Schrauwen wrote: > Any httpd people coming to FOSDEM in Brussels, Belgium this weekend? +1 for me. Dw

Re: Any standard on picking a response status out of several possible?

2010-11-10 Thread Dirk-Willem van Gulik
On 10 Nov 2010, at 14:42, Dan Poirier wrote: > If multiple response statuses would be valid for a request (e.g. 403, > 413), is there any standard on how to pick one? I looked through RFC > 2616 but didn't see anything. Or is it just an implementation detail? This was subject of a fair bit of

Re: Log file rotation patch

2010-11-05 Thread Dirk-Willem van Gulik
On 4 Nov 2010, at 21:26, Brian J. France wrote: > With the current patch, see link below, it changes the syntax to ErrorLog to > this: > > ErrorLog file-path|syslog[:facility] [rotating[:]] Nice! > There is one security issue that people may have a problem with in that the > directory path

  1   2   3   4   >