Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 31 Jan 2012 19:15:43 -0800
From:      Jason Helfman <jgh@FreeBSD.org>
To:        "Philip M. Gollucci" <pgollucci@taximagic.com>
Cc:        FreeBSD-gnats-submit@freebsd.org, apache@freebsd.org
Subject:   Re: www/apache22: update to 2.2.22 (addresses multiple CVE reports)
Message-ID:  <CAMuy=%2Bgy9Z7Ec=-6xQ5roqa9mAELahDRv1mG1ph2bfhy47CRtA@mail.gmail.com>
In-Reply-To: <4F28A12D.2080504@p6m7g8.com>
References:  <201202010011.q110Btm0002906@freefall.freebsd.org> <4F28A12D.2080504@p6m7g8.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Jan 31, 2012 at 6:19 PM, Philip M. Gollucci <pgollucci@taximagic.com
> wrote:

> Do not change this file.  You're reverting a local change we've pulled
> from trunk svn for security.
>
> Please commit the rest of the patch with my review / hat.
>
>
>
>  ==============================**==============================**=======
>> RCS file: /home/pcvs/ports/www/apache22/**files/patch-docs__conf__extra_*
>> *_httpd-ssl.conf.in <http://patch-docs__conf__extra__httpd-ssl.conf.in>,v
>> retrieving revision 1.3
>> diff -u -r1.3 patch-docs__conf__extra__**httpd-ssl.conf.in<http://patch-docs__conf__extra__httpd-ssl.conf.in>;
>> --- files/patch-docs__conf__extra_**_httpd-ssl.conf.in<http://patch-docs__conf__extra__httpd-ssl.conf.in>;   23 Jan 2012 23:24:38 -0000      1.3
>> +++ files/patch-docs__conf__extra_**_httpd-ssl.conf.in<http://patch-docs__conf__extra__httpd-ssl.conf.in>;   1 Feb 2012 00:05:53 -0000
>> @@ -1,58 +1,22 @@
>> ---- ./docs/conf/extra/httpd-ssl.**conf.in.orig   2008-02-04
>> 23:00:07.000000000 +0000
>> -+++ ./docs/conf/extra/httpd-ssl.**conf.in <http://httpd-ssl.conf.in>;
>>      2012-01-23 23:20:06.446390870 +0000
>> -@@ -77,17 +77,35 @@
>> +--- ./docs/conf/extra/httpd-ssl.**conf.in.orig   2012-01-31 15:16:43.000000000
>> -0800
>> ++++ ./docs/conf/extra/httpd-ssl.**conf.in <http://httpd-ssl.conf.in>;
>>      2012-01-31 15:17:47.000000000 -0800
>> +@@ -77,8 +77,8 @@
>>   DocumentRoot "@exp_htdocsdir@"
>>   ServerName www.example.com:@@SSLPort@@
>>   ServerAdmin you@example.com
>>  -ErrorLog "@exp_logfiledir@/error_log"
>>  -TransferLog "@exp_logfiledir@/access_log"
>> -+ErrorLog "@exp_logfiledir@/httpd-error.**log"
>> -+TransferLog "@exp_logfiledir@/httpd-**access.log"
>> ++ErrorLog "@exp_logfiledir@/httpd-error_**log"
>> ++TransferLog "@exp_logfiledir@/httpd-**access_log"
>>
>>   #   SSL Engine Switch:
>>   #   Enable/Disable SSL for this virtual host.
>> - SSLEngine on
>> -
>> -+#   SSL Protocol support:
>> -+#   List the protocol versions which clients are allowed to
>> -+#   connect with. Disable SSLv2 by default (cf. RFC 6176).
>> -+SSLProtocol all -SSLv2
>> -+
>> - #   SSL Cipher Suite:
>> - #   List the ciphers that the client is permitted to negotiate.
>> - #   See the mod_ssl documentation for a complete list.
>> --SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+**
>> HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:**+eNULL
>> -+SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
>> -+
>> -+#   Speed-optimized SSL Cipher configuration:
>> -+#   If speed is your main concern (on busy HTTPS servers e.g.),
>> -+#   you might want to force clients to specific, performance
>> -+#   optimized ciphers. In this case, prepend those ciphers
>> -+#   to the SSLCipherSuite list, and enable SSLHonorCipherOrder.
>> -+#   Caveat: by giving precedence to RC4-SHA and AES128-SHA
>> -+#   (as in the example below), most connections will no longer
>> -+#   have perfect forward secrecy - if the server's key is
>> -+#   compromised, captures of past or future traffic must be
>> -+#   considered compromised, too.
>> -+#SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:**MEDIUM:!aNULL:!MD5
>> -+#SSLHonorCipherOrder on
>> -
>> - #   Server Certificate:
>> - #   Point SSLCertificateFile at a PEM encoded certificate.  If
>> -@@ -218,14 +236,14 @@
>> - #   Similarly, one has to force some clients to use HTTP/1.0 to
>> workaround
>> - #   their broken HTTP/1.1 implementation. Use variables "downgrade-1.0"
>> and
>> - #   "force-response-1.0" for this.
>> --BrowserMatch ".*MSIE.*" \
>> -+BrowserMatch "MSIE [2-5]" \
>> -          nokeepalive ssl-unclean-shutdown \
>> -          downgrade-1.0 force-response-1.0
>> -
>> +@@ -243,7 +243,7 @@
>>   #   Per-Server Logging:
>>   #   The home of a custom SSL log file. Use this when you want a
>>   #   compact non-error SSL logfile on a virtual host basis.
>>  -CustomLog "@exp_logfiledir@/ssl_request_**log" \
>> -+CustomLog "@exp_logfiledir@/httpd-ssl_**request.log" \
>> ++CustomLog "@exp_logfiledir@/httpd-ssl_**request_log" \
>>             "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
>>
>>   </VirtualHost>
>> ______________________________**_________________
>> freebsd-apache@freebsd.org mailing list
>> http://lists.freebsd.org/**mailman/listinfo/freebsd-**apache<http://lists.freebsd.org/mailman/listinfo/freebsd-apache>;
>> To unsubscribe, send any mail to "freebsd-apache-unsubscribe@**
>> freebsd.org <freebsd-apache-unsubscribe@freebsd.org>"
>>
>>
>
> --
> ------------------------------**------------------------------**
> ------------
> 1024D/DB9B8C1C B90B FBC3 A3A1 C71A 8E70  3F8C 75B8 8FFB DB9B 8C1C
> Philip M. Gollucci (pgollucci@p6m7g8.com) c: 703.336.9354
> Member,                           Apache Software Foundation
> Committer,                        FreeBSD Foundation
> Consultant,                       P6M7G8 Inc.
> Director Operations,              Ridecharge Inc.
>
> Work like you don't need the money,
> love like you'll never get hurt,
> and dance like nobody's watching.
>
>
I will be glad to do that, however it didn't patch cleanly. The additions
were in the downloaded source, unless I am mistaken.
Can you please verify?
-jgh



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAMuy=%2Bgy9Z7Ec=-6xQ5roqa9mAELahDRv1mG1ph2bfhy47CRtA>