Re: Pull mod_unique_id out of default build?

2009-11-05 Thread Ruediger Pluem
On 11/06/2009 06:45 AM, Nick Kew wrote: > On 6 Nov 2009, at 05:30, Sander Temme wrote: > >> Maybe my understanding is limited and my fu is weak, but I have >> personally never had a use for mod_unique_id. The only thing it does >> for me is an error message on startup or, when my server finds i

Re: Pull mod_unique_id out of default build?

2009-11-05 Thread Nick Kew
On 6 Nov 2009, at 05:30, Sander Temme wrote: Maybe my understanding is limited and my fu is weak, but I have personally never had a use for mod_unique_id. The only thing it does for me is an error message on startup or, when my server finds itself on a box with a hostname that doesn't reso

Pull mod_unique_id out of default build?

2009-11-05 Thread Sander Temme
Folks, Maybe my understanding is limited and my fu is weak, but I have personally never had a use for mod_unique_id. The only thing it does for me is an error message on startup or, when my server finds itself on a box with a hostname that doesn't resolve to an IP address, failure. Coul

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Joe Orton
On Fri, Nov 06, 2009 at 12:00:06AM +, Joe Orton wrote: > On Thu, Nov 05, 2009 at 09:31:00PM +, Joe Orton wrote: > > * we can detect in mod_ssl when the client is renegotiating by using the > > callback installed using SSL_CTX_set_info_callback(), in conjunction > > with suitable flags in

Re: Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dr Stephen Henson
Dirk-Willem van Gulik wrote: > Dirk-Willem van Gulik wrote: > >> Actually Steve - you may know - what besides the obvious >> >> extendedKeyUsage=nsSGC,msSGC >> >> in the extension file needs to go into a sub-ca below a >> self-signed-root-chain to make the browsers dance ? Or have they >> hardcode

Re: Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dirk-Willem van Gulik
Dirk-Willem van Gulik wrote: Actually Steve - you may know - what besides the obvious extendedKeyUsage=nsSGC,msSGC in the extension file needs to go into a sub-ca below a self-signed-root-chain to make the browsers dance ? Or have they hardcoded in some specific CA or similar ? Or is there a t

Re: Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dirk-Willem van Gulik
Dr Stephen Henson wrote: There are two separate types used by Mozilla (Step up?) and Microsoft SSL/TLS (SGC?) implementations IIRC. One completes the handshake then starts a new session the second cuts it half way through. Been many years since I looked at those though. I recall having to alter

Re: Httpd 3.0 or something else

2009-11-05 Thread Greg Stein
On a phone, so pls excuse my brevity... I think a lot of your discussion can be easily passed off to Apache Thrift. Let it handle all the message passing to external procceses, and its provided multi-language support. On Nov 5, 2009 4:31 PM, "Graham Dumpleton" wrote: 2009/11/5 Graham Leggett :

Re: Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dirk-Willem van Gulik
Dr Stephen Henson wrote: There are two separate types used by Mozilla (Step up?) and Microsoft SSL/TLS (SGC?) implementations IIRC. One completes the handshake then starts a new session the second cuts it half way through. Been many years since I looked at those though. I recall having to alter

Re: Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dirk-Willem van Gulik
Andrews, Rick wrote: https://www.chase.com https://www.wellsfargo.com But I suppose you'll need to locate an old international browser that does step up, right? Most modern browsers will start with strong crypto and don't need to step up. What we really need is 1) a pub/priv key pair of

Re: Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dr Stephen Henson
Dirk-Willem van Gulik wrote: > we propably > only have the step up 'Server Gated Certs'* let to check. > > Does anyone have such a beast for testing ? > There are two separate types used by Mozilla (Step up?) and Microsoft SSL/TLS (SGC?) implementations IIRC. One completes the handshake then sta

Server Gated Certs (Was: TLS renegotiation attack, mod_ssl and OpenSSL)

2009-11-05 Thread Dirk-Willem van Gulik
So with Joe his patch doing the right thing it seems (would be nice if we could get Ben or the OpenSSL guys to confirm that) - that we propably only have the step up 'Server Gated Certs'* let to check. Does anyone have such a beast for testing ? or Rick - could you help us here ? Thanks, Dw.

Re: Httpd 3.0 or something else

2009-11-05 Thread Akins, Brian
On 11/5/09 4:30 PM, "Graham Dumpleton" wrote: > Thoughts? Still digesting, but generally +1 to the entire post. -- Brian Akins

Re: Httpd 3.0 or something else

2009-11-05 Thread Graham Dumpleton
2009/11/5 Graham Leggett : > Jim Jagielski wrote: > >> Let's get 2.4 out. And then let's rip it to shreds and drop >> buckets/brigades and fold in serf. > > I think we should decide on exactly what problem we're trying to solve, > before we start thinking about how it is to be solved. > > I'm keen

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Rainer Jung
On 06.11.2009 01:12, Joe Orton wrote: > On Fri, Nov 06, 2009 at 12:00:06AM +, Joe Orton wrote: > FYI - Dirk points out that you can test this using openssl s_client by > entering a line with the single character 'R' which s_client treats as a > command to initiate a renegotiation. Joe > >

Re: Httpd 3.0 or something else

2009-11-05 Thread Mladen Turk
On 05/11/09 12:38, Graham Leggett wrote: Jim Jagielski wrote: Let's get 2.4 out. And then let's rip it to shreds and drop buckets/brigades and fold in serf. I think we should decide on exactly what problem we're trying to solve, before we start thinking about how it is to be solved. +1 I'

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Joe Orton
On Fri, Nov 06, 2009 at 12:00:06AM +, Joe Orton wrote: > On Thu, Nov 05, 2009 at 09:31:00PM +, Joe Orton wrote: > > * we can detect in mod_ssl when the client is renegotiating by using the > > callback installed using SSL_CTX_set_info_callback(), in conjunction > > with suitable flags in

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Joe Orton
On Thu, Nov 05, 2009 at 09:31:00PM +, Joe Orton wrote: > * we can detect in mod_ssl when the client is renegotiating by using the > callback installed using SSL_CTX_set_info_callback(), in conjunction > with suitable flags in the SSLConnRec to detect the cases where this is > either a server

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Ruediger Pluem
On 11/05/2009 11:03 PM, Dirk-Willem van Gulik wrote: > Joe Orton wrote: > >> * we can detect in mod_ssl when the client is renegotiating by using the >> callback installed using SSL_CTX_set_info_callback(), in conjunction >> with suitable flags in the SSLConnRec to detect the cases where this is

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Dirk-Willem van Gulik
Joe Orton wrote: * we can detect in mod_ssl when the client is renegotiating by using the callback installed using SSL_CTX_set_info_callback(), in conjunction with suitable flags in the SSLConnRec to detect the cases where this is either a server-initiated renegotiation or the initial handshake

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Joe Orton
On Thu, Nov 05, 2009 at 09:38:23PM +0100, Ruediger Pluem wrote: > If server triggered renegotiation will not work at all, people will just > ignore the > update or remove it from 0.9.8l in their self patched versions. > So overall I guess we would be safer with an approach that > > 1. Turns off r

Re: Httpd 3.0 or something else

2009-11-05 Thread Jie Gao
How about support of openmp? Regards, Jie

Re: TLS renegotiation attack, mod_ssl and OpenSSL

2009-11-05 Thread Ruediger Pluem
On 11/05/2009 06:32 PM, Joe Orton wrote: > On Thu, Nov 05, 2009 at 03:39:06PM +, Ben Laurie wrote: >> Joe Orton wrote: >>> In the short term, I think it would be useful to have a new SSL_OP_* >>> flag which enables rejection of a client-initiated handshake in an SSL >>> server. This will f

Re: Httpd 3.0 or something else

2009-11-05 Thread Bojan Smojver
On Thu, 2009-11-05 at 13:38 +0200, Graham Leggett wrote: > I'm keen to teach httpd v3.0 to work asynchronously throughout - still > maintaining the prefork behaviour as a sensible default[1], but being > asynchronous and non blocking throughout. > > [1] The fact that dodgy module code can leak, cr