|
Revision tags: lighttpd-1.4.69 |
|
| #
82a26c1b |
| 05-Jan-2023 |
Glenn Strauss <[email protected]> |
[TLS] fix spurious warning trace (fixes #3182)
(thx flynn)
x-ref: "Test config reports invalid ssl.pemfile in $HTTP["host"] condition" https://redmine.lighttpd.net/issues/3182
|
|
Revision tags: lighttpd-1.4.68 |
|
| #
7de6e1b3 |
| 12-Dec-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] match mod_openssl CLOSE_NOTIFY
|
| #
5e14db43 |
| 10-Dec-2022 |
Glenn Strauss <[email protected]> |
[multiple] employ ck_calloc, ck_malloc shared code
employ ck_calloc(), ck_malloc() shared code to slightly reduce code size (centralize the ck_assert() to check that memory allocation succeeded)
|
| #
b82d7b8a |
| 06-Dec-2022 |
Glenn Strauss <[email protected]> |
[multiple] mark mod_*_plugin_init() funcs cold
|
| #
326ace4f |
| 23-Oct-2022 |
Glenn Strauss <[email protected]> |
[TLS] simplify TLS config; remove deprecated opts
simplify TLS config; remove deprecated options
These scheduled lighttpd behavior changes have been announced over the past year.
lighttpd aims to
[TLS] simplify TLS config; remove deprecated opts
simplify TLS config; remove deprecated options
These scheduled lighttpd behavior changes have been announced over the past year.
lighttpd aims to provide reasonably secure TLS configuration defaults, and to periodically review and update TLS configuration defaults. Doing so reduces the need for distros, packagers, and end-users to specify their own TLS config customizations, which may then be neglected or cargo-culted far into the future, instead of being periodically updated to use stronger defaults.
x-ref: https://wiki.lighttpd.net/Docs_SSL
show more ...
|
| #
126cc8d1 |
| 23-Oct-2022 |
Glenn Strauss <[email protected]> |
[TLS] upgrade default cipher list to stronger set
upgrade default cipher list to stronger set, changing default from "HIGH" to "EECDH+AESGCM:AES256+EECDH:CHACHA20:!SHA1:!SHA256:!SHA384"
openssl cip
[TLS] upgrade default cipher list to stronger set
upgrade default cipher list to stronger set, changing default from "HIGH" to "EECDH+AESGCM:AES256+EECDH:CHACHA20:!SHA1:!SHA256:!SHA384"
openssl ciphers 'EECDH+AESGCM:AES256+EECDH:CHACHA20:!SHA1:!SHA256:!SHA384' expands to "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:TLS_AES_128_CCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-CCM8:ECDHE-ECDSA-AES256-CCM:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:RSA-PSK-CHACHA20-POLY1305:DHE-PSK-CHACHA20-POLY1305:ECDHE-PSK-CHACHA20-POLY1305:PSK-CHACHA20-POLY1305"
Most of these ciphers are widely supported and have been for many years. These scheduled lighttpd behavior changes have been announced over the past year.
Providing a strong default cipher list reduces the need for distros, packagers, and end-users to specify their own cipher lists, which may then be neglected or cargo-culted far into the future, instead of being periodically updated to use stronger defaults.
x-ref: https://wiki.lighttpd.net/Docs_SSL
show more ...
|
| #
6e78e4e8 |
| 30-Nov-2022 |
Glenn Strauss <[email protected]> |
[TLS] handle '+' on ssl-conf-cmd "Options"
|
| #
76188fdb |
| 26-Oct-2022 |
Glenn Strauss <[email protected]> |
[TLS] try DER format if reading PEM format fails
try DER format if reading PEM format fails for ssl.pemfile, ssl.privkey
|
| #
4750d4ee |
| 26-Oct-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] cast to fix compile error
|
| #
ec781984 |
| 03-Oct-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] check for cert must_staple
check for cert must_staple with wolfssl 5.0.0+
|
| #
c7273b1e |
| 01-Oct-2022 |
Glenn Strauss <[email protected]> |
[TLS] ssl.openssl.ssl-conf-cmd "DHParameters"
support "DHParameters" in ssl.openssl.ssl-conf-cmd (replacement for ssl.dh-file)
isolate code setting DHParameters into its own subroutine (code reuse)
[TLS] ssl.openssl.ssl-conf-cmd "DHParameters"
support "DHParameters" in ssl.openssl.ssl-conf-cmd (replacement for ssl.dh-file)
isolate code setting DHParameters into its own subroutine (code reuse)
Note: TLS library defaults should be preferred over specifying DH params
show more ...
|
|
Revision tags: lighttpd-1.4.67, lighttpd-1.4.66 |
|
| #
81a0e437 |
| 24-Jun-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] compat with older wolfssl versions
wolfSSL_X509_get_name_oneline() added in wolfssl v4.4.0
|
|
Revision tags: lighttpd-1.4.65 |
|
| #
833f6aa4 |
| 30-May-2022 |
Glenn Strauss <[email protected]> |
[TLS] inherit ssl.engine from global scope
Since lighttpd 1.4.56, an oversight in config processing missed setting explicitly p->conf.ssl_enabled = 0 in network.c when initializing conditions. When
[TLS] inherit ssl.engine from global scope
Since lighttpd 1.4.56, an oversight in config processing missed setting explicitly p->conf.ssl_enabled = 0 in network.c when initializing conditions. When ssl.engine = "enable" in lighttpd.conf global scope, the missing reset in network.c required non-TLS ports (e.g. $SERVER["socket"] == ":80") to contain ssl.engine = "disable" in order for requests to those ports to be served rather than erroring.
(This error was discovered during collaboration with jens-maus in https://github.com/jens-maus/RaspberryMatic/pull/1847)
There have been zero other instances of this error reported since the release of lighttpd 1.4.56 in Nov 2020.
Therefore, having ssl.engine = "enable" inherited from the global scope is unlikely to have any widespread impact in practice, and enabling ssl.engine = "enable" (along with TLS certificate configuration) is now recommended as default. When ssl.engine = "enable" in the global scope, ssl.engine = "disable" should be specified in those $SERVER["socket"] conditions where clear-text is desired.
show more ...
|
| #
669ae77f |
| 12-May-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] compile fix for OpenWRT
|
| #
2adc62e9 |
| 04-May-2022 |
Glenn Strauss <[email protected]> |
[multiple] simplify bytes_in/bytes_out accounting
encapsulate accounting calculations in http_request_stats_bytes_in() http_request_stats_bytes_out()
more accurate accounting for HTTP/1.1 bytes_i
[multiple] simplify bytes_in/bytes_out accounting
encapsulate accounting calculations in http_request_stats_bytes_in() http_request_stats_bytes_out()
more accurate accounting for HTTP/1.1 bytes_in on keep-alive requests (affects case where client pipelines HTTP/1.1 requests)
remove con->bytes_read and con->bytes_written (no longer needed since request_st was split from connection struct and request bytes_read_ckpt and bytes_written_ckpt are maintained for HTTP/1.x bytes_in and bytes_out accounting. Also, further back, chunkqueue internal accounting was simplified to maintain bytes_in and bytes_out to always match chunkqueue length)
show more ...
|
| #
fbade185 |
| 20-Apr-2022 |
Glenn Strauss <[email protected]> |
[multiple] reset http vers, avoid rare crash (fixes #3152)
(thx ultimator)
do not set r->http_version to HTTP_VERSION_2 when selecting TLS ALPN if r->handler_module already set, since handler modul
[multiple] reset http vers, avoid rare crash (fixes #3152)
(thx ultimator)
do not set r->http_version to HTTP_VERSION_2 when selecting TLS ALPN if r->handler_module already set, since handler module is likely mod_sockproxy, and con->h2 will not get initialized.
This does continue to select "h2", so the mod_sockproxy backend should be prepared to receive the HTTP/2 client connection preface.
x-ref: "Random Segfaults with version 1.4.64 w/ mod_sockproxy and ALPN h2" https://redmine.lighttpd.net/issues/3152
show more ...
|
| #
b1f7ccd7 |
| 15-Apr-2022 |
Glenn Strauss <[email protected]> |
[multiple] limit scope of socket config options
warn if socket config options used only at startup are used outside global scope or $SERVER["socket"] with '==' condition
|
| #
aea4a180 |
| 27-Mar-2022 |
Glenn Strauss <[email protected]> |
[TLS] warn if leaf cert read is inactive/expired
When reading certificates, warn if leaf certificate is inactive/expired (according to notBefore, notAfter fields of leaf certificate) (note: not addi
[TLS] warn if leaf cert read is inactive/expired
When reading certificates, warn if leaf certificate is inactive/expired (according to notBefore, notAfter fields of leaf certificate) (note: not adding a delta for fudge factor when comparing times) (note: not currently verifying each certificate in chain)
show more ...
|
| #
d05289b1 |
| 27-Mar-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] wolfssl v5.0.0 adds ASN1_TIME_diff()
wolfssl v5.0.0 adds functional wolfSSL_ASN1_TIME_diff()
|
| #
3ee5b840 |
| 19-Feb-2022 |
Glenn Strauss <[email protected]> |
[mod_wolfssl] wolfssl v5.0.0 defines DH_set0_pqg()
|
|
Revision tags: lighttpd-1.4.64, lighttpd-1.4.63, lighttpd-1.4.62, lighttpd-1.4.61, lighttpd-1.4.60 |
|
| #
ff45d586 |
| 26-Sep-2021 |
Glenn Strauss <[email protected]> |
[multiple] clarify error msg when no cert avail
|
| #
4d99d9b7 |
| 22-Sep-2021 |
Glenn Strauss <[email protected]> |
[multiple] check feature flags funcs; code reuse
config_feature_bool() config_feature_int()
|
| #
db54269c |
| 27-Jul-2021 |
Juliusz Sosinowicz <[email protected]> |
[mod_wolfssl] wolfSSL_sk_X509_NAME_push change
adjust code for wolfSSL_sk_X509_NAME_push() interface change in wolfssl v4.8.0
[gstrauss: edited var names, whitespace, comments, commit message]
x-r
[mod_wolfssl] wolfSSL_sk_X509_NAME_push change
adjust code for wolfSSL_sk_X509_NAME_push() interface change in wolfssl v4.8.0
[gstrauss: edited var names, whitespace, comments, commit message]
x-ref: "[wolfssl] Correct return check for wolfSSL_sk_X509_NAME_push" https://github.com/lighttpd/lighttpd1.4/pull/107
github: closes #107
show more ...
|
| #
309c1693 |
| 12-Jul-2021 |
Glenn Strauss <[email protected]> |
[multiple] Y2038 32-bit signed time_t mitigations
Most OS platforms have already provided solutions to Y2038 32-bit signed time_t 5 - 10 years ago (or more!) Notable exceptions are Linux i686 and Fr
[multiple] Y2038 32-bit signed time_t mitigations
Most OS platforms have already provided solutions to Y2038 32-bit signed time_t 5 - 10 years ago (or more!) Notable exceptions are Linux i686 and FreeBSD i386.
Since 32-bit systems tend to be embedded systems, and since many distros take years to pick up new software, this commit aims to provide Y2038 mitigations for lighttpd running on 32-bit systems with Y2038-unsafe 32-bit signed time_t
* Y2038: lighttpd 1.4.60 and later report Y2038 safety $ lighttpd -V + Y2038 support # Y2038-SAFE $ lighttpd -V - Y2038 support (unsafe 32-bit signed time_t) # Y2038-UNSAFE
* Y2038: general platform info * Y2038-SAFE: lighttpd 64-bit builds on platforms using 64-bit time_t - all major 64-bit platforms (known to this author) use 64-bit time_t * Y2038-SAFE: lighttpd 32-bit builds on platforms using 64-bit time_t - Linux x32 ABI (different from i686) - FreeBSD all 32-bit and 64-bit architectures *except* 32-bit i386 - NetBSD 6.0 (released Oct 2012) all 32-bit and 64-bit architectures - OpenBSD 5.5 (released May 2014) all 32-bit and 64-bit architectures - Microsoft Windows XP and Visual Studio 2005 (? unsure ?) Another reference suggests Visual Studio 2015 defaults to 64-bit time_t - MacOS 10.15 Catalina (released 2019) drops support for 32-bit apps * Y2038-SAFE: lighttpd 32-bit builds on platforms using 32-bit unsigned time_t - e.g. OpenVMS (unknown if lighttpd builds on this platform) * Y2038-UNSAFE: lighttpd 32-bit builds on platforms using 32-bit signed time_t - Linux 32-bit (including i686) - glibc 32-bit library support not yet available for 64-bit time_t - https://sourceware.org/glibc/wiki/Y2038ProofnessDesign - Linux kernel 5.6 on 32-bit platforms does support 64-bit time_t https://itsubuntu.com/linux-kernel-5-6-to-fix-the-year-2038-issue-unix-y2k/ - https://www.gnu.org/software/libc/manual/html_node/64_002dbit-time-symbol-handling.html "Note: at this point, 64-bit time support in dual-time configurations is work-in-progress, so for these configurations, the public API only makes the 32-bit time support available. In a later change, the public API will allow user code to choose the time size for a given compilation unit." - compiling with -D_TIME_BITS=64 currently has no effect - glibc recent (Jul 2021) mailing list discussion - https://public-inbox.org/bug-gnulib/[email protected]/T/ - FreeBSD i386 - DragonFlyBSD 32-bit
* Y2038 mitigations attempted on Y2038-UNSAFE platforms (32-bit signed time_t) * lighttpd prefers system monotonic clock instead of realtime clock in places where realtime clock is not required * lighttpd treats negative time_t values as after 19 Jan 2038 03:14:07 GMT * (lighttpd presumes that lighttpd will not encounter dates before 1970 during normal operation.) * lighttpd casts struct stat st.st_mtime (and st.st_*time) through uint64_t to convert negative timestamps for comparisions with 64-bit timestamps (treating negative timestamp values as after 19 Jan 2038 03:14:07 GMT) * lighttpd provides unix_time64_t (int64_t) and * lighttpd provides struct unix_timespec64 (unix_timespec64_t) (struct timespec equivalent using unix_time64_t tv_sec member) * lighttpd provides gmtime64_r() and localtime64_r() wrappers for platforms 32-bit platforms using 32-bit time_t and lighttpd temporarily shifts the year in order to use gmtime_r() and localtime_r() (or gmtime() and localtime()) from standard libraries, before readjusting year and passing struct tm to formatting functions such as strftime() * lighttpd provides TIME64_CAST() macro to cast signed 32-bit time_t to unsigned 32-bit and then to unix_time64_t
* Note: while lighttpd tries handle times past 19 Jan 2038 03:14:07 GMT on 32-bit platforms using 32-bit signed time_t, underlying libraries and underlying filesystems might not behave properly after 32-bit signed time_t overflows (19 Jan 2038 03:14:08 GMT). If a given 32-bit OS does not work properly using negative time_t values, then lighttpd likely will not work properly on that system.
* Other references and blogs - https://en.wikipedia.org/wiki/Year_2038_problem - https://en.wikipedia.org/wiki/Time_formatting_and_storage_bugs - http://www.lieberbiber.de/2017/03/14/a-look-at-the-year-20362038-problems-and-time-proofness-in-various-systems/
show more ...
|
| #
f490078d |
| 15-Jun-2021 |
Glenn Strauss <[email protected]> |
[multiple] buffer_copy_string_len_lc()
convenience wrapper combining buffer_copy_string_len() buffer_to_lower() and making a single pass over string
|