Launchpad has imported 21 comments from the remote bug at
https://bz.apache.org/bugzilla/show_bug.cgi?id=49559.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2010-07-06T09:12:39+00:00 Erwann-abalea wrote:

Created attachment 25714
Allow admin-choosen DH parameters for DHE enabled cipher-modes

In order to be EAL4+ validated for one of our customers, Apache needs to
be able to support 2048+ bits group size for Diffie-Hellman parameters.
Right now, temporary parameters are 512 and 1024 bits only.

We can still disallow DH at all, leaving only RSA for authentication and
pre-master secret encryption, but that's a suboptimal solution, as we
then loose forward secrecy.

Adding a 2048 bits DH temporary key into mod_ssl is not possible, since
OpenSSL would only ask for a 512/1024 bits one, depending on the
"exportability" of the choosen ciper-mode.

This patch adds a new configuration directive, "SSLDHParametersFile <file>", 
allowing the administrator to supply its own Diffie-Hellman parameters 
("openssl dhparam 2048 > dhparam2048.pem" to generate 2048 bits ones, for 
example).
If this directive is specified and parameters are found in the supplied file, 
then these parameters will be used whenever DHE is used to negociate the 
pre-master secret. If this directive is not used, then it works like it does 
now, leaving OpenSSL ask mod_ssl for a set of parameters of the desired size 
(512 or 1024 bits).

We'd like this to be evaluated, discussed, and if possible, applied.

Regards.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/0

------------------------------------------------------------------------
On 2012-04-30T18:22:51+00:00 Erwann-abalea wrote:

Created attachment 28699
Updated patch for 2.4.2

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/1

------------------------------------------------------------------------
On 2012-04-30T18:29:45+00:00 Erwann-abalea wrote:

A new version of the patch has been provided, based on httpd 2.4.2.
When generating your own DH parameters, add the "-dsaparam" option to openssl 
commandline, this speeds up the handshake by about 15% for a 1024bits prime to 
30% for a 2048bits prime.
With "-dsaparam" option, the private key is limited to 160 bits for a <2048bits 
prime, and 256 bits for a >=2048bits one. You then have 80bits of security for 
a 1024bits prime, but based on NFS results you can't get much.
2048bits prime with a 256bits private key length gives you 128bits of security.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/2

------------------------------------------------------------------------
On 2013-06-24T17:09:10+00:00 Michaelm12-asfbugzilla wrote:

Any idea on when this might make it into 2.4.x or 2.2.x?

Many thanks.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/3

------------------------------------------------------------------------
On 2013-07-21T22:45:20+00:00 Frazzzzze wrote:

I would like to see this added to 2.2.x and 2.4.x too!

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/6

------------------------------------------------------------------------
On 2013-08-04T18:10:23+00:00 Geoffroy+dev wrote:

In addition, Elliptic Curve choice should also be given to the server
admin in a similar way (e.g. SSLCurveList <enabled_curve_list> ). Tell
the admin to execute 'openssl ecparam -list_curves' to get a list of the
supported curves.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/8

------------------------------------------------------------------------
On 2013-08-16T08:47:13+00:00 Christoph_vW wrote:

Would someone please apply this patch to 2.2.x and 2.4.x ... ?

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/9

------------------------------------------------------------------------
On 2013-08-16T08:53:33+00:00 Harald-dunkel-r wrote:

I'd love to see this added to 2.2.x and 2.4.y

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/10

------------------------------------------------------------------------
On 2013-09-08T08:10:11+00:00 Asfbugz wrote:

Created attachment 30804
PoC: read (EC)DHE parameters from SSLCertificateFile (applies to trunk and 
2.4.x)

I'm fine with the idea, but the implementation in the patches submitted
so far is too complex, in my opinion (in particular the
SSL_read_DHparams stuff, which tries to support/read three different
formats).

Here is an alternative proposal:

- only support PEM-formatted parameters (-----BEGIN DH PARAMETERS---- /
-----END DH PARAMETERS-----)

- use the existing SSLCertificateFile directive to support per-vhost,
custom DHE and ECDHE parameters

Attached is a - lightly tested - proof of concept, to be applied to
either trunk or 2.4.x... testing and feedback welcome. To specify EC
curve names, append the output of "openssl ecparam -name secp521r1" or
your favorite curve to SSLCertificateFile (of course the docs for
SSLCertificateFile would have to be extended, if there is a general
agreement on taking this approach).

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/11

------------------------------------------------------------------------
On 2013-09-08T12:15:59+00:00 Erwann-abalea wrote:

(In reply to Kaspar Brand from comment #8)
> Created attachment 30804 [details]
> PoC: read (EC)DHE parameters from SSLCertificateFile (applies to trunk and
> 2.4.x)
> 
> I'm fine with the idea, but the implementation in the patches submitted so
> far is too complex, in my opinion (in particular the SSL_read_DHparams
> stuff, which tries to support/read three different formats).

This function is similar to SSL_read_X509 and SSL_read_PrivateKey
defined in the same file, and used by the module to read the
corresponding objects.

That said, I'm not fluent in Apache internals, and I admit some things
may have been done more easily. I tried to mimic how already existing
elements (keys and certs) were declared, registered and used, when
adding a new element type (DHParams).

> - use the existing SSLCertificateFile directive to support per-vhost, custom
> DHE and ECDHE parameters

The original patch is also vhost-aware.
It doesn't know about ECDHE, that's true. That wasn't critical at that time 
(2010) because nobody used ECDHE, and even today the used curve is the standard 
NIST P256, offering 128bits of security in theory. Since a few weeks, some 
people want to be able to specify the curve used, there's nothing wrong with 
that.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/12

------------------------------------------------------------------------
On 2013-09-08T15:25:43+00:00 Hiding-l wrote:

(In reply to Kaspar Brand from comment #8)

I applied your patch in my testing environment with httpd-2.4.6 and it
works as advertised. After appending DH parameters to the certificate
file, all DH ciphers were using the expected key size.

I found it a bit confusing that you actually have to put the params
alongside your certificate into one file. One has to pay more attention
to these additional settings on changing the certificate.

But if it is actually way more easy to implement DH / ECDHE parameters
this way, then it is probably the way to go.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/13

------------------------------------------------------------------------
On 2013-09-15T10:48:04+00:00 Asfbugz wrote:

(In reply to Erwann Abalea from comment #9)
> This function is similar to SSL_read_X509 and SSL_read_PrivateKey defined in
> the same file, and used by the module to read the corresponding objects.

Perhaps this is an opportunity to clean up some mod_ssl cruft... I just
took an extended proposal to the mailing list, to stir some further
discussion:

http://mail-archives.apache.org/mod_mbox/httpd-
dev/201309.mbox/%3c52358ed1.2070...@velox.ch%3E

Additionally, I think we should consider to use 2048-bit DH parameters
by default if the cert's RSA/DSA key is 2048 bits or more (so that
sysadmin's don't have to generate their custom DH parameters to get more
than 1024 bits for DHE). Changing this by default is probably debatable,
and therefore another reason I'm taking it to the list.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/15

------------------------------------------------------------------------
On 2013-09-15T14:23:33+00:00 Frazzzzze wrote:

DH-parameters should always be at least the same size as the SSL certificate, 
so if I use 4096 or even 8192 bit for the certificate a DH parameter with only 
2048 bit would effectively weaken the whole connection down to 2048 bit, which 
we don't want and in a few years we would have the exactly same situation ( DH 
parameters too weak and not FULLY selectable) as we do right now 
So please consider this and let the admin choose freely, but at least make sure 
DH parameters bits are never smaller than SSL certificate bits!

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/16

------------------------------------------------------------------------
On 2013-09-29T10:49:16+00:00 Asfbugz wrote:

Comment on attachment 30804
PoC: read (EC)DHE parameters from SSLCertificateFile (applies to trunk and 
2.4.x)

For trunk, this issue has been addressed with r1527295 (with updated
documentation under
https://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslcertificatefile).
A backport proposal for 2.4.x will likely follow.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/17

------------------------------------------------------------------------
On 2013-10-01T17:32:51+00:00 Asfbugz wrote:

Backport to 2.4.x proposed with r1528154. Patch available at
https://people.apache.org/~kbrand/mod_ssl-2.4.x-ekh.diff.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/18

------------------------------------------------------------------------
On 2013-10-20T22:36:27+00:00 Nick Le Mouton wrote:

The patch https://people.apache.org/~kbrand/mod_ssl-2.4.x-ekh.diff seems
to break TLS 1.1 and 1.2 on my setup (RHEL 6.x, apache 2.4.6, openssl
1.0.1e). I haven't had a chance to look into it further, but using
ssllabs.com it no longer showed me as supporting > TLS 1.0

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/22

------------------------------------------------------------------------
On 2013-10-20T23:25:10+00:00 Nick Le Mouton wrote:

Sorry, was a config error on my side. Patch works well.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/23

------------------------------------------------------------------------
On 2013-11-01T03:19:34+00:00 dkg wrote:

I'm glad to see this patch being backported to 2.4.  What are the
considerations for backporting it to the 2.2.x branch as well?

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/24

------------------------------------------------------------------------
On 2013-11-27T06:28:14+00:00 Asfbugz wrote:

Comment on attachment 28699
Updated patch for 2.4.2

Marking as obsolete, since a different approach has been implemented in
2.4.x.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/26

------------------------------------------------------------------------
On 2013-11-27T06:29:16+00:00 Asfbugz wrote:

Fixed in 2.4.7 with r1542327.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/27

------------------------------------------------------------------------
On 2015-06-01T16:42:11+00:00 Ylavic-dev wrote:

Backported to 2.2.30 in r1680916.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1197884/comments/41


** Changed in: apache2
       Status: Unknown => Fix Released

** Changed in: apache2
   Importance: Unknown => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1197884

Title:
  apache2.2 SSL has no forward-secrecy: need ECDHE keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/apache2/+bug/1197884/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to