CVE requested for mod-fcgid 2.3.6 (possible DoS vulnerability)

2012-03-15 Thread Daniel Kahn Gillmor
Hi Apache folks-- Just a heads-up to let you know that i've requested a CVE for mod_fcgid's 2.3.6 (the current release) due to possible DoS based on the module not respecting administrator-configured limits: http://www.openwall.com/lists/oss-security/2012/03/15/10 The issue is fixed in

please sign new apache releases only with strong keys -- trimming the KEYS file

2013-12-26 Thread Daniel Kahn Gillmor
Hi apache folks-- In http://bugs.debian.org/732450, debian is preparing to cryptographically verify OpenPGP signatures on apache upstream tarballs. As part of the dicsussion, it's become clear that some of the keys in https://www.apache.org/dist/httpd/KEYS are weak by any modern consideration of

Re: please sign new apache releases only with strong keys -- trimming the KEYS file

2013-12-27 Thread Daniel Kahn Gillmor
On 12/26/2013 06:18 PM, Nick Kew wrote: You're ahead of us. Individual Apache folks like Jim have taken responsibility and moved to 4096-bit keys, but we haven't as a community had the discussion that might lead to pruning KEYS. My inclination is to say NO to requiring anyone to remove old

Re: please sign new apache releases only with strong keys -- trimming the KEYS file

2013-12-31 Thread Daniel Kahn Gillmor
On 12/31/2013 01:19 PM, Graham Leggett wrote: It is also a statement of what keys have historically been used to sign past artifacts, and that is just as important. These are distinct things, though. It would be great if the apache project could separately identify which keys are going to be

agent-based framework for httpd private keys [was: Re: SSL_CTX_get_{first,next}_certificate]

2014-02-06 Thread Daniel Kahn Gillmor
On 02/06/2014 12:35 AM, Kaspar Brand wrote: On 05.02.2014 18:13, Falco Schwarz wrote: Kaspar, I ran into another issue when using an encrypted private key and SSLOpenSSLConfCmd PrivateKey. Again it fails to load the encrypted private key with the following errors: That's by design, see

Re: mod_ssl-2.4.x-certkeyfile and OCSPStapling

2014-02-09 Thread Daniel Kahn Gillmor
On 02/05/2014 02:44 AM, Kaspar Brand wrote: On 05.02.2014 08:25, Brian Smith wrote: It would be possible for a server to fetch and staple the OCSP response only using the information from the server's end-entity certificate. Actually no - you can't properly fill in the CertID for the

how to use authn_provider for password-less authentication within a module ?

2014-02-17 Thread Daniel Kahn Gillmor
Hi, i'm trying to revive mod_gnutls and bring it up to date with current apache module practices, and i'd like to use apache 2.4's mod_auth framework for user authentication via client-side certificates. i'm limiting the scope of this question to authentication because i do not have a good use

Re: Behavior of Host: vs. SNI Hostname in proxy CONNECT requests

2014-02-18 Thread Daniel Kahn Gillmor
On 02/18/2014 08:14 AM, Pavel Matěja wrote: There is one big risk when someone uses reverse HTTPS proxy with ServerAlias. Let say you have on both - backend and proxy servers options: ServerName www.example.com ServerAlias example.com In old non-SNI days everything was working just fine.

Re: mod_ssl patch: use new OpenSSL features to autofix cert chains

2014-03-26 Thread Daniel Kahn Gillmor
On 03/26/2014 07:11 AM, Emilia Kasper wrote: The patch fixes a) by sanity-checking the chain and chopping self-signed roots. I believe it's harmless to turn on by default as the rebuild step will either yield a valid chain or preserve the original configuration. I like this suggestion. with a

Re: mod_ssl patch: use new OpenSSL features to autofix cert chains

2014-03-26 Thread Daniel Kahn Gillmor
On 03/26/2014 11:29 AM, Emilia Kasper wrote: Cross-signing happens all the time but afaik the other way around, i.e., an intermediate Y' corresponding to a _newer_ root cert Y is cross-signed by some _older_ root cert Z. So an old client would usually know only Z and a newer client would know

Re: mod_ssl patch: use new OpenSSL features to autofix cert chains

2014-03-27 Thread Daniel Kahn Gillmor
On 03/27/2014 09:27 AM, Emilia Kasper wrote: HPKP can never work this way. Pin validation is always done on top of normal TLS validation and can only invalidate an otherwise valid connection and never the other way around. Otherwise I could trivially hijack connections by pinning sites to a

Re: mod_ssl patch: use new OpenSSL features to autofix cert chains

2014-03-27 Thread Daniel Kahn Gillmor
On 03/27/2014 12:37 PM, Rob Stradling wrote: On 26/03/14 16:46, Daniel Kahn Gillmor wrote: snip it doesn't even need to fetch the certificate itself, it could just make the big noisy error log say you should fetch the cert from AIAURL and append it to SSLCertificateChainFile AIAURL

Re: agent-based framework for httpd private keys

2014-04-08 Thread Daniel Kahn Gillmor
On Sun 2014-02-09 02:15:37 -0500, Kaspar Brand wrote: On 07.02.2014 01:58, Daniel Kahn Gillmor wrote: As part of the goal of dropping encrypted private key support, have you considered using an agent-based framework for private keys? I haven't, no, since an important aspect of that goal

Re: Any reason why building with OpenSSL shouldn't add its lib dir to rpath?

2014-04-14 Thread Daniel Kahn Gillmor
On 04/14/2014 07:08 AM, Jeff Trawick wrote: (not to say there aren't complications, like trying to keep system directories out of rpath) I think that you're asking for mod_ssl to add an openssl-specific directory to its rpath. in general, i would discourage this; at the least, it needs to be

Re: DH params and multiple certificates in one VHost

2014-04-18 Thread Daniel Kahn Gillmor
On 04/18/2014 08:34 AM, Falco Schwarz wrote: As of httpd-2.4.7 the strength of DH temp keys is determined by the private key's bit length. I recently noticed the following behavior (using httpd-2.4.9 and openssl-1.0.2-beta2-dev): I am using multiple certificates for one VHost (ECC and RSA):

Re: apache hintlist

2014-04-23 Thread Daniel Kahn Gillmor
On 04/22/2014 08:57 AM, Ligade, Shailesh [USA] wrote: I think by default, the certificate hint list asks for client authentication certificates. Is there any configuration option to ask for different types of certificates? e.g. signing or encryption certificates? In TLS, the client's secret

Re: [PATCH] Support RFC5929 - Channel Bindings for TLS

2014-08-05 Thread Daniel Kahn Gillmor
On 08/05/2014 06:24 PM, Simo Sorce wrote: I have been working for a little while on making it possible to use channel bindings within an Apache server. In order to do that some support to extract information form the TLS layer is necessary in the server. This is great idea, but be aware that

Re: [PATCH] Support RFC5929 - Channel Bindings for TLS

2014-08-05 Thread Daniel Kahn Gillmor
On 08/05/2014 09:06 PM, Simo Sorce wrote: Yeah I know it is broken, does it mean you want to have it disabled and return an error if requested until a fixed openssl library/call is available ? Not only did i not have a concrete proposal, I don't have any particular say in the matter -- i'm not

Re: RFC 7540 (HTTP/2) wrt reusable connections and SNI

2015-06-10 Thread Daniel Kahn Gillmor
On Tue 2015-06-09 13:43:59 -0400, Roy T. Fielding wrote: WRT renegotiation, it is fair to say that the WG punted on the idea due to lack of time. If someone figures out a way to safely renegotiate an h2 connection (and all of its streams), then go ahead and implement it, describe it in an