Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-10 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

David,

On 4/10/14, 10:39 AM, David Landis wrote:
> On Wed, Apr 9, 2014 at 1:24 AM, Christopher Schultz < 
> ch...@christopherschultz.net> wrote:
>> 
>> 
>>> (Checked http://filippo.io/Heartbleed before and after) I built
>>> APR and Tomcat Native from source on the server, so I assume
>>> it's doing dynamic library loading.
>>> 
>>> Is the binary build staticly linked? Otherwise, I'm not sure
>>> it's necessary to redo the builds.
>> 
>> The ASF only provides binaries for win32, and yes, they are 
>> statically-linked. Users without the expertise to build their
>> own tcnative binary will have to wait for the tcnative team to
>> roll a new release.
>> 
> 
> 
> What about for Linux? If you originally compiled libtcnative with
> an older OpenSSL, is it sufficient to simply upgrade that OpenSSL,
> or does the libtcnative need to be recompiled? Thanks.

Most people use dynamically-linked libraries in Linux (or everywhere
for that matter... the static-linked win32 library is done for
particular reasons). So simply upgrading OpenSSL on Linux will usually
take care of everything. If you happened to build tcnative yourself
and did so with static-linking against OpenSSL, then you'll have to
re-build.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=J2qI
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-10 Thread David Landis
On Wed, Apr 9, 2014 at 1:24 AM, Christopher Schultz <
ch...@christopherschultz.net> wrote:
>
>
> > (Checked http://filippo.io/Heartbleed before and after) I built APR
> > and Tomcat Native from source on the server, so I assume it's doing
> > dynamic library loading.
> >
> > Is the binary build staticly linked? Otherwise, I'm not sure it's
> > necessary to redo the builds.
>
> The ASF only provides binaries for win32, and yes, they are
> statically-linked. Users without the expertise to build their own
> tcnative binary will have to wait for the tcnative team to roll a new
> release.
>


What about for Linux? If you originally compiled libtcnative with an older
OpenSSL, is it sufficient to simply upgrade that OpenSSL, or does the
libtcnative need to be recompiled? Thanks.


RE: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-09 Thread Jeffrey Janner
> -Original Message-
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> Sent: Wednesday, April 09, 2014 12:25 AM
> To: Tomcat Users List
> Subject: Re: Does the HeartBleed vulnerability affect Apache Tomcat
> servers using Tomcat Native?
> 
> 
> Arlo,
> 
> On 4/8/14, 5:36 PM, Arlo White wrote:
> > After updating OpenSSL I simply restarted Tomcat to eliminate the
> > vulnerability.
> 
> - -1
> 
> You must re-key your server, and get a new cert from your CA. You have
> stopped the bleeding but your key should still be considered
> compromised.
> 
> > (Checked http://filippo.io/Heartbleed before and after) I built APR
> > and Tomcat Native from source on the server, so I assume it's doing
> > dynamic library loading.
> >
> > Is the binary build staticly linked? Otherwise, I'm not sure it's
> > necessary to redo the builds.
> 
> The ASF only provides binaries for win32, and yes, they are statically-
> linked. Users without the expertise to build their own tcnative binary
> will have to wait for the tcnative team to roll a new release.
> 
> - -chris
Just to clarify what Chris is saying, ASF provides statically-linked binaries 
for Windows in zip files with the string "win32" in the name.  The zip file 
actually contains versions for both x86 and x64 versions of Windows.
And yes, some of us don't have the expertise and/or tools to build the library 
ourselves under Windows.
Jeff


Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Arlo,

On 4/8/14, 4:36 PM, Arlo White wrote:
> What would the Tomcat code change be?

No code changes, even at the tcnative level. It just requires a
re-link (remember, it's statically-linked on win32) with a safe
OpenSSL build.

> I suppose it'd be nice if Tomcat refused to boot and logged an
> ERROR with a vulnerable SSL version? Is that what you were
> thinking?

While this sounds like a good idea in theory, it can fail in practice.
For example, I have an updated Debian 7 system:

$ openssl version
OpenSSL 1.0.1e 11 Feb 2013

But when I run http://filippo.io/Heartbleed against it, it says that I
am protected. That's likely due to a recent Debian-only patch against
1.0.1e: http://www.debian.org/security/2014/dsa-2896

So this means that Debian's OpenSSL version, which will report 1.0.1e,
is safe, so rejecting it based upon version number is not appropriate.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=QgTY
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Ognjen,

On 4/9/14, 3:16 AM, Ognjen Blagojevic wrote:
> Chris,
> 
> On 9.4.2014 7:22, Christopher Schultz wrote:
>> - -1
>> 
>> Switching to JSSE only stops the hemorrhaging. You should 
>> consider all your server keys compromised if OpenSSL 1.0.1 was 
>> used (prior to "g" patch level). If you switch to JSSE, your key 
>> may already have been compromised, so the switch does not
>> protect you.
>> 
>> If you were lucky enough to have been ignored by Internet 
>> miscreants, then switching will protect you, but it's a bad bet. 
>> The better bet is to upgrade ASAP to a 1.0.1g version of OpenSSL 
>> and then re-key everything.
>> 
>> Then change all your passwords. :(
> 
> I agree. What I was supposed to say is: After you revoke 
> certificates, and reissue a new one, you may switch to JSSE 
> connector, and then, wait for patched version of tcnative dll. 
> Thank you for pointing that out.

Yup. Technically, it should only require a re-link, since none of the
tcnative code should actually need a change. However, it's probably
best to bump the version number to avoid too much confusion.

Mladen is working on it right now. We'll see what action he chooses to
take. I hope he builds a new version from current 1.1 branch, 'cause I
want some new features available ;)

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=PMId
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-09 Thread Ognjen Blagojevic

Chris,

On 9.4.2014 7:22, Christopher Schultz wrote:

- -1

Switching to JSSE only stops the hemorrhaging. You should consider all
your server keys compromised if OpenSSL 1.0.1 was used (prior to "g"
patch level). If you switch to JSSE, your key may already have been
compromised, so the switch does not protect you.

If you were lucky enough to have been ignored by Internet miscreants,
then switching will protect you, but it's a bad bet. The better bet is
to upgrade ASAP to a 1.0.1g version of OpenSSL and then re-key everything.

Then change all your passwords. :(


I agree. What I was supposed to say is: After you revoke certificates, 
and reissue a new one, you may switch to JSSE connector, and then, wait 
for patched version of tcnative dll. Thank you for pointing that out.


-Ognjen

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Arlo,

On 4/8/14, 5:36 PM, Arlo White wrote:
> After updating OpenSSL I simply restarted Tomcat to eliminate the 
> vulnerability.

- -1

You must re-key your server, and get a new cert from your CA. You have
stopped the bleeding but your key should still be considered compromised.

> (Checked http://filippo.io/Heartbleed before and after) I built APR
> and Tomcat Native from source on the server, so I assume it's doing
> dynamic library loading.
> 
> Is the binary build staticly linked? Otherwise, I'm not sure it's 
> necessary to redo the builds.

The ASF only provides binaries for win32, and yes, they are
statically-linked. Users without the expertise to build their own
tcnative binary will have to wait for the tcnative team to roll a new
release.

- -chris

> On 04/08/2014 03:30 PM, Jeffrey Janner wrote:
>>> -Original Message- From: Jeffrey Janner
>>> [mailto:jeffrey.jan...@polydyne.com] Sent: Tuesday, April 08,
>>> 2014 5:14 PM To: 'Tomcat Users List' Subject: RE: Does the
>>> HeartBleed vulnerability affect Apache Tomcat servers using
>>> Tomcat Native?
>>> 
>>> Ognjen, Has anyone entered a bugzilla request for this one? 
>>> Jeff
>>> 
>> Answering myself: 
>> https://issues.apache.org/bugzilla/show_bug.cgi?id=56363 Might I
>> suggest folks please go vote this one up big time!
>> 
>> -
>>
>> 
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: users-h...@tomcat.apache.org
>> 
> 
> 
> -
>
> 
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=fHHn
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Ognjen,

On 4/8/14, 2:02 PM, Ognjen Blagojevic wrote:
> On 8.4.2014 18:48, Arlo White wrote:
>> Are Apache Tomcat servers using Tomcat Native & APR vulnerable to
>> the HeartBleed OpenSSL bug, or does this layer insulate them? 
>> http://heartbleed.com/
> 
> They are vulnerable. There is no layer to insulate.
> 
> You may test with:
> 
> http://filippo.io/Heartbleed/
> 
> I tested with Tomcat 8.0.5 with tcnative 1.1.29, which includes
> OpenSSL 1.0.1e, on Windows 7 64-bit, and it confirms the
> vulnerability.
> 
> JSSE Connectors are not vulnerables so, one possible workaround is
> to swich to NIO or BIO connector until patched version of tcnative
> is available.

- -1

Switching to JSSE only stops the hemorrhaging. You should consider all
your server keys compromised if OpenSSL 1.0.1 was used (prior to "g"
patch level). If you switch to JSSE, your key may already have been
compromised, so the switch does not protect you.

If you were lucky enough to have been ignored by Internet miscreants,
then switching will protect you, but it's a bad bet. The better bet is
to upgrade ASAP to a 1.0.1g version of OpenSSL and then re-key everything.

Then change all your passwords. :(

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=C7kz
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Arlo White
After updating OpenSSL I simply restarted Tomcat to eliminate the 
vulnerability. (Checked http://filippo.io/Heartbleed before and after)
I built APR and Tomcat Native from source on the server, so I assume 
it's doing dynamic library loading.


Is the binary build staticly linked? Otherwise, I'm not sure it's 
necessary to redo the builds.


On 04/08/2014 03:30 PM, Jeffrey Janner wrote:

-Original Message-
From: Jeffrey Janner [mailto:jeffrey.jan...@polydyne.com]
Sent: Tuesday, April 08, 2014 5:14 PM
To: 'Tomcat Users List'
Subject: RE: Does the HeartBleed vulnerability affect Apache Tomcat
servers using Tomcat Native?

Ognjen,
Has anyone entered a bugzilla request for this one?
Jeff


Answering myself:
https://issues.apache.org/bugzilla/show_bug.cgi?id=56363
Might I suggest folks please go vote this one up big time!

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Arlo White

What would the Tomcat code change be?

I suppose it'd be nice if Tomcat refused to boot and logged an ERROR 
with a vulnerable SSL version? Is that what you were thinking?


On 04/08/2014 03:13 PM, Jeffrey Janner wrote:

Ognjen,
Has anyone entered a bugzilla request for this one?
Jeff


-Original Message-
From: Ognjen Blagojevic [mailto:ognjen.d.blagoje...@gmail.com]
Sent: Tuesday, April 08, 2014 3:02 PM
To: Tomcat Users List
Subject: Re: Does the HeartBleed vulnerability affect Apache Tomcat
servers using Tomcat Native?

On 8.4.2014 18:48, Arlo White wrote:

Are Apache Tomcat servers using Tomcat Native & APR vulnerable to the
HeartBleed OpenSSL bug, or does this layer insulate them?
http://heartbleed.com/

They are vulnerable. There is no layer to insulate.

You may test with:

http://filippo.io/Heartbleed/

I tested with Tomcat 8.0.5 with tcnative 1.1.29, which includes OpenSSL
1.0.1e, on Windows 7 64-bit, and it confirms the vulnerability.

JSSE Connectors are not vulnerables so, one possible workaround is to
swich to NIO or BIO connector until patched version of tcnative is
available.

-Ognjen

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Jeffrey Janner
> -Original Message-
> From: Jeffrey Janner [mailto:jeffrey.jan...@polydyne.com]
> Sent: Tuesday, April 08, 2014 5:14 PM
> To: 'Tomcat Users List'
> Subject: RE: Does the HeartBleed vulnerability affect Apache Tomcat
> servers using Tomcat Native?
> 
> Ognjen,
> Has anyone entered a bugzilla request for this one?
> Jeff
> 
Answering myself:
https://issues.apache.org/bugzilla/show_bug.cgi?id=56363
Might I suggest folks please go vote this one up big time!


RE: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Jeffrey Janner
Ognjen,
Has anyone entered a bugzilla request for this one?
Jeff

> -Original Message-
> From: Ognjen Blagojevic [mailto:ognjen.d.blagoje...@gmail.com]
> Sent: Tuesday, April 08, 2014 3:02 PM
> To: Tomcat Users List
> Subject: Re: Does the HeartBleed vulnerability affect Apache Tomcat
> servers using Tomcat Native?
> 
> On 8.4.2014 18:48, Arlo White wrote:
> > Are Apache Tomcat servers using Tomcat Native & APR vulnerable to the
> > HeartBleed OpenSSL bug, or does this layer insulate them?
> > http://heartbleed.com/
> 
> They are vulnerable. There is no layer to insulate.
> 
> You may test with:
> 
>http://filippo.io/Heartbleed/
> 
> I tested with Tomcat 8.0.5 with tcnative 1.1.29, which includes OpenSSL
> 1.0.1e, on Windows 7 64-bit, and it confirms the vulnerability.
> 
> JSSE Connectors are not vulnerables so, one possible workaround is to
> swich to NIO or BIO connector until patched version of tcnative is
> available.
> 
> -Ognjen
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Does the HeartBleed vulnerability affect Apache Tomcat servers using Tomcat Native?

2014-04-08 Thread Ognjen Blagojevic

On 8.4.2014 18:48, Arlo White wrote:

Are Apache Tomcat servers using Tomcat Native & APR vulnerable to the
HeartBleed OpenSSL bug, or does this layer insulate them?
http://heartbleed.com/


They are vulnerable. There is no layer to insulate.

You may test with:

  http://filippo.io/Heartbleed/

I tested with Tomcat 8.0.5 with tcnative 1.1.29, which includes OpenSSL 
1.0.1e, on Windows 7 64-bit, and it confirms the vulnerability.


JSSE Connectors are not vulnerables so, one possible workaround is to 
swich to NIO or BIO connector until patched version of tcnative is 
available.


-Ognjen

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org