Return-Path: X-Original-To: apmail-httpd-dev-archive@www.apache.org Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 9AE321080A for ; Tue, 7 Jan 2014 17:40:59 +0000 (UTC) Received: (qmail 87842 invoked by uid 500); 7 Jan 2014 17:40:54 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 87722 invoked by uid 500); 7 Jan 2014 17:40:53 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 87713 invoked by uid 99); 7 Jan 2014 17:40:53 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 07 Jan 2014 17:40:53 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=5.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [85.25.46.13] (HELO fornix.velox.ch) (85.25.46.13) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 07 Jan 2014 17:40:47 +0000 Received: from cortex.velox.ch (77-57-164-164.dclient.hispeed.ch [77.57.164.164]) (authenticated bits=0) by fornix.velox.ch (8.14.4/8.14.4/2.2) with ESMTP id s07HePu4031329 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 7 Jan 2014 18:40:26 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=velox.ch; s=fornix-727e; t=1389116426; bh=clkfizxOh+jrSZFrBtMSUHPQPDeioIKf5ks8TqDKS2c=; h=Date:From:To:Subject:References:In-Reply-To; b=iTGjEMeEVNxWknhYIT/yMfq1jP5M7SUghfh46YX9aD/1JOXKBQQu45Q11hfTvTwnF e8C4C5mZ1yLlLKCU6EAKy9rAVxvoQEYXl9X3NJewJmXcuiZIk4/Rawu7SWqI5Mqrdf uRqzpql73enQuQ/yseMT/LzcW46tIbbvSLpgaSlUjvFDAT+5WcUDb1oWPh3vGXME0d 7XL9zVE27+7yZ2F+8S1Y7wjqVYXJRR3G5svN6k2rmgNDTMw0fMqG314w2DzrT/ZFQe b5b4UDjNWGQKbRPQAjZkZoDE2oyGhcw4sP+PHtG5U2wkpFbgq1Ts/DL1KFgVkJRzZ4 x9Ujb8gFUAoFg== X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on cortex.velox.ch X-Spam-Level: Message-ID: <52CC3C0D.1030902@velox.ch> DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=velox.ch; s=cortex-8a58; t=1389116423; bh=clkfizxOh+jrSZFrBtMSUHPQPDeioIKf5ks8TqDKS2c=; h=Date:From:To:Subject:References:In-Reply-To; b=VOQ25cglMz4MrgOjManR2U3wbvaX7aOAhK6HKTwQO97sJGwin7o7UF+d5oUQU/83D Kc/BRjw+OW7tEHPRgwY8odoM+xXJqbzIiSj0LGlIPJb8GjDuTrTS5lCgssPHsgQVpr TC9xxmk3EeQdm6yoWDLlp1DhSa8nJQeI7H1+kD98+nQpGih/wq1sgIfupchfTiOIju UGivA7+P5r3tTGmE2KhgkTQLOnY9qciOiPKT45D2AMNHN9eVz/eOWhtYJ0IgKmHvr0 Oouilpk0YqRpNZ4esdojG+fJQaz0isfk+GBmcGXsWWi0vMaFFXWQrWAgS5Et+CUB9n SgzkMekFtrIYg== Date: Tue, 07 Jan 2014 18:40:29 +0100 From: Kaspar Brand MIME-Version: 1.0 To: dev@httpd.apache.org Subject: Re: Deprecating (and eventually removing) encrypted private key support in mod_ssl? References: <52838765.8020401@velox.ch> <52838C8F.5020803@opensslfoundation.com> <52846792.1050403@velox.ch> <20131114115430.GA5939@redhat.com> <5288DA3F.1060602@velox.ch> <5288E006.5030707@opensslfoundation.com> <528A2668.4020601@opensslfoundation.com> <528A518B.1070903@velox.ch> <52BED37B.5020909@velox.ch> <52C73EEC.2060208@opensslfoundation.com> <52C91F12.4060005@velox.ch> <52C96784.6090104@opensslfoundation.com> In-Reply-To: <52C96784.6090104@opensslfoundation.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org X-Old-Spam-Status: No, score=-1.5 required=8.0 tests=BAYES_00=-1.5, NO_RECEIVED=-0.001,NO_RELAYS=-0.001,T_DKIM_INVALID=0.01 autolearn=no version=3.3.2 On 05.01.2014 15:09, Dr Stephen Henson wrote: > One the subject of 1.0.2 would it be appropriate to set auto ecdh parameter > selection as the default in mod_ssl where supported? As things stand one single > curve can be set (with default P-256) and it's an all or nothing choice, with > auto parameter selection the highest priority curve supported by both sides is used. For ephemeral keys, you mean? So something like the below in ssl_init_server_certs? I think that would make sense if the admin did not explicitly configure a single curve (together with the "Curves" SSL_CONF command, this should allow "to configure a list of curve names [...] (from which OpenSSL would then pick the first which intersects with the elliptic_curves extension from the ClientHello)", as mentioned in [1], right?). Kaspar [1] https://mail-archives.apache.org/mod_mbox/httpd-dev/201309.mbox/%3C52369430.3050807@velox.ch%3E --- modules/ssl/ssl_engine_init.c (revision 1555662) +++ modules/ssl/ssl_engine_init.c (working copy) @@ -1020,11 +1020,16 @@ static apr_status_t ssl_init_server_certs(server_r OBJ_nid2sn(nid), vhost_id, certfile); } /* - * ...otherwise, configure NIST P-256 (required to enable ECDHE) + * ...otherwise, enable auto curve selection (OpenSSL 1.0.2 and later) + * or configure NIST P-256 (required to enable ECDHE for earlier versions) */ else { +#if defined(SSL_CTX_set_ecdh_auto) + SSL_CTX_set_ecdh_auto(mctx->ssl_ctx, 1); +#else SSL_CTX_set_tmp_ecdh(mctx->ssl_ctx, EC_KEY_new_by_curve_name(NID_X9_62_prime256v1)); +#endif } #endif