Re: 2.4 release backport list

2015-05-26 Thread Nick Kew
On Tue, 26 May 2015 10:37:28 +0200 Stefan Eissing stefan.eiss...@greenbytes.de wrote: Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has received

mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Rainer Jung
Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented DH and ECDH parameters, however, are only read from the first SSLCertificateFile directive, as they are applied independently of the authentication algorithm

Re: 2.4 release backport list

2015-05-26 Thread Graham Leggett
On 26 May 2015, at 10:37 AM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has received enough

Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Tim Bannister
On 26 May 2015, at 09:37, Reindl Harald h.rei...@thelounge.net wrote: Am 26.05.2015 um 10:33 schrieb Rainer Jung: Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented DH and ECDH parameters, however, are only

Re: Two questions on mod_ssl source code details

2015-05-26 Thread Rainer Jung
Am 22.05.2015 um 18:35 schrieb Yann Ylavic: On Fri, May 22, 2015 at 6:29 PM, Rainer Jung rainer.j...@kippdata.de wrote: 1) In other code I see EC_KEY_free(ecdh); after EC_KEY *ecdh = EC_KEY_new_by_curve_name(...) and using ecdh, e.g. in SSL_CTX_set_tmp_ecdh(mctx-ssl_ctx, eckey);

2.4 release backport list

2015-05-26 Thread Stefan Eissing
Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has received enough votes? Thanks. //Stefan green/bytes GmbH Hafenweg 16, 48155 Münster, Germany Phone:

Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Reindl Harald
Am 26.05.2015 um 10:33 schrieb Rainer Jung: Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented DH and ECDH parameters, however, are only read from the first SSLCertificateFile directive, as they are applied

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
Oups, several simultaneous responses... Hope too much information does not kill the information :p On Tue, May 26, 2015 at 11:03 AM, Yann Ylavic ylavic@gmail.com wrote: Hi Stefan, On Tue, May 26, 2015 at 10:37 AM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Sorry, if this question

Re: 2.4 release backport list

2015-05-26 Thread Rainer Jung
Hi Stefan, Am 26.05.2015 um 10:37 schrieb Stefan Eissing: Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has received enough votes? The backports

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
Hi Stefan, On Tue, May 26, 2015 at 10:37 AM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Sorry, if this question has an obvious answer which I was unable to find: where would I find a list of the changes that will be backported to the 2.4.13 release in order to see if a change has

Re: 2.4 release backport list

2015-05-26 Thread Stefan Eissing
Thanks for the many answers! Now, can I win someone over to propose backporting the mod_ssl ALPN changes? I have prepared something: * mod_ssl: add ALPN support by allowing other modules to register callbacks for negotiation of the application layer protocol. trunk patch:

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Now, can I win someone over to propose backporting the mod_ssl ALPN changes? [to committers] Who goes? It would be funny to have 4 proposals though... :)

Re: mod_ssl: Reading dhparams and ecparams not only from the first certificate file

2015-05-26 Thread Rainer Jung
Am 26.05.2015 um 11:00 schrieb Tim Bannister: On 26 May 2015, at 09:37, Reindl Harald h.rei...@thelounge.net wrote: Am 26.05.2015 um 10:33 schrieb Rainer Jung: Current mod_ssl code tries to read embedded DH and ECC parameters only from the first certificate file. Although this is documented

Re: 2.4 release backport list

2015-05-26 Thread Stefan Eissing
Flattery! (I experience I am not immune to this…) Thanks for all the replies! I am currently making a patch that contains all the ALPN changes from trunk and works in 2.4. Hope that someone then can include this as proposal in the 2.4.13 STATUS. May it find votes! Back soonish... Am

Re: 2.4 release backport list

2015-05-26 Thread Rainer Jung
Am 26.05.2015 um 11:07 schrieb Yann Ylavic: Oups, several simultaneous responses... That shows how much we like him (his work) :)

Re: svn commit: r1676004 - in /httpd/httpd/trunk: docs/manual/mod/ modules/ssl/

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 2:03 PM, Yann Ylavic ylavic@gmail.com wrote: On Sat, Apr 25, 2015 at 11:46 AM, kbr...@apache.org wrote: Author: kbrand Date: Sat Apr 25 09:46:09 2015 New Revision: 1676004 URL: http://svn.apache.org/r1676004 Log: Remove NPN support and focus on ALPN (RFC 7301)

Re: svn commit: r1676004 - in /httpd/httpd/trunk: docs/manual/mod/ modules/ssl/

2015-05-26 Thread Stefan Eissing
Good catch. Was done in r1676004 and reverted in r1681746. The latter slipped through my NPN/ALPN sieve. So, basically the html changes should be removed from the patch. //Stefan Am 26.05.2015 um 14:03 schrieb Yann Ylavic ylavic@gmail.com: On Sat, Apr 25, 2015 at 11:46 AM,

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Thanks for the many answers! Now, can I win someone over to propose backporting the mod_ssl ALPN changes? Proposed in r1681749 by also including r1681741 (CHANGES entry) and r1681746 (revert on HTML docs

Re: 2.4 release backport list

2015-05-26 Thread Stefan Eissing
Thanks Yann! Am 26.05.2015 um 14:26 schrieb Yann Ylavic ylavic@gmail.com: On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Thanks for the many answers! Now, can I win someone over to propose backporting the mod_ssl ALPN changes? Proposed in

Re: 2.4 release backport list

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 2:26 PM, Yann Ylavic ylavic@gmail.com wrote: On Tue, May 26, 2015 at 12:30 PM, Stefan Eissing stefan.eiss...@greenbytes.de wrote: Thanks for the many answers! Now, can I win someone over to propose backporting the mod_ssl ALPN changes? Proposed in r1681749 by

mod_proxy_fcgi default port

2015-05-26 Thread Jan Kaluža
Hi, currently the port for fcgi:// protocol defaults to 8000. Is there any reason why we use this port number as a default? Also, I think this default port number is not documented anywhere. I'm asking, because php-fpm uses port 9000 by default. I know that these ports are not standardized

Re: svn commit: r1676004 - in /httpd/httpd/trunk: docs/manual/mod/ modules/ssl/

2015-05-26 Thread Yann Ylavic
On Sat, Apr 25, 2015 at 11:46 AM, kbr...@apache.org wrote: Author: kbrand Date: Sat Apr 25 09:46:09 2015 New Revision: 1676004 URL: http://svn.apache.org/r1676004 Log: Remove NPN support and focus on ALPN (RFC 7301) [] Modified: httpd/httpd/trunk/docs/manual/mod/directives.html.en

Re: SSL/TLS best current practice

2015-05-26 Thread William A Rowe Jr
On Tue, May 26, 2015 at 10:45 AM, Yann Ylavic ylavic@gmail.com wrote: On Tue, May 26, 2015 at 5:29 PM, Andy Wang aw...@ptc.com wrote: # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. # See the mod_ssl documentation for a complete list.

Re: SSL/TLS best current practice

2015-05-26 Thread Yann Ylavic
On Tue, May 26, 2015 at 5:29 PM, Andy Wang aw...@ptc.com wrote: --- # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. # See the mod_ssl documentation for a complete list. SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4 SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4

Re: mod_proxy_fcgi default port

2015-05-26 Thread Tim Bannister
How about asking IANA to assign a port? -- Tim Bannister – is...@c8h10n4o2.org.uk

Re: SSL/TLS best current practice

2015-05-26 Thread Andy Wang
--- # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. # See the mod_ssl documentation for a complete list. SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4 SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4 !aNULL isn't needed?

Re: httpd - side channel attack - timing of digest comparisons

2015-05-26 Thread Dirk-Willem van Gulik
Folks, Did a scan through a fair bit of our code. mod_digest is not the only place; e.g. in basic auth; we are also not as careful in all cases as we could be. So I think that what is needed are two (or three) functions - A fairly mundane (binary) timing safe compare that compares two

Re: SSL/TLS best current practice

2015-05-26 Thread Andy Wang
On 05/26/2015 11:25 AM, William A Rowe Jr wrote: On Tue, May 26, 2015 at 10:45 AM, Yann Ylavic ylavic@gmail.com mailto:ylavic@gmail.com wrote: On Tue, May 26, 2015 at 5:29 PM, Andy Wang aw...@ptc.com mailto:aw...@ptc.com wrote: # SSL Cipher Suite: # List

Re: httpd - side channel attack - timing of digest comparisons

2015-05-26 Thread Dirk-Willem van Gulik
On 26 May 2015, at 17:22, Dirk-Willem van Gulik di...@webweaving.org wrote: .. So I think that what is needed are two (or three) functions ... - A string comparison function; where at least one string is is under control of the attacker. Now the issue here is that length is every easily