summaryrefslogtreecommitdiffstats
path: root/mod_nss.c
Commit message (Collapse)AuthorAgeFilesLines
* Check filesystem permissions on NSS database at startupRob Crittenden2016-03-011-0/+3
| | | | | | | | | | | | | See if the configured user has read access to the NSS database during initialization so the server can gracefully shutdown rather than ending up in a forking loop because the database is owned by root and is therefore unreadable once Apache starts forking. Adds a new configuration option, NSSSkipPermissionCheck <on/off>, to skip this check in case something goes wrong. https://fedorahosted.org/mod_nss/ticket/3
* Cleanup to remove a slew of trailing whitespaceRob Crittenden2015-10-021-9/+9
|
* Rework SNI client reverse proxyRob Crittenden2015-10-021-1/+1
| | | | | | | | | | | | | Add a note to the table to indicate that the handhake is complete so we don't set the extension every time data is read or written. Drop NSSHandshakeCallback() as it didn't do anything and is replaced by the proxy callback. Extend the checks around calling SetURL to match those in mod_ssl: - a hostname is available - not SSLv3 - not an IP address
* Fix compatibility with RHEL 6.x (Apache 2.2.x and NSS 3.15.1)Rob Crittenden2015-10-021-0/+4
|
* Add support for Server Name Indication (SNI)Rob Crittenden2015-10-021-0/+5
| | | | | | | | Uses a hash table to pair up server names and nicknames and a lookup is done during the handshake to determine which nickname to be used, and therefore which VirtualHost. Based heavily on patch from Stanislav Tokos <stokos@suse.de>
* Add support for TLS Session Tickets (RFC 5077)Rob Crittenden2015-06-111-0/+3
| | | | | | New server/vhost config option, NSSSessionTickets, to enable or disable TLS Session Tickets support. This is off by default in NSS.
* Add RenegBufferSize optionRob Crittenden2015-06-101-0/+5
| | | | | | | Control the buffer size used on a POST when SSL renegotiation is being done. The default is 128K. Resolves BZ 1214366
* Add support for enabling TLS v1.2Rob Crittenden2014-10-161-2/+2
| | | | | If support is available in NSS then it is just a matter of including TLS 1.2 in the protocol range.
* Apache 2.4 compatibility changesRob Crittenden2014-02-211-1/+1
|
* Work with mod_proxy when mod_ssl is also loaded.Rob Crittenden2014-02-211-7/+23
| | | | | | | | There is a single-set of hooks in mod_proxy so if mod_ssl was even loaded,even if not being used, it would grab those hooks and mod_nss would not work. Resolves #1021469
* Add support for TLS v1.1, protocol ranges.Rob Crittenden2014-02-211-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | Set protocol version ranges: (1) Set the minimum protocol accepted (2) Set the maximum protocol accepted (3) Protocol ranges extend from maximum down to minimum protocol (4) All protocol ranges are completely inclusive; no protocol in the middle of a range may be excluded (5) NSS automatically negotiates the use of the strongest protocol for a connection starting with the maximum specified protocol and downgrading as necessary to the minimum specified protocol For example, if SSL 3.0 is chosen as the minimum protocol, and TLS 1.1 is chosen as the maximum protocol, SSL 3.0, TLS 1.0, and TLS 1.1 will all be accepted as protocols, as TLS 1.0 will not and cannot be excluded from this range. NSS will automatically negotiate to utilize the strongest acceptable protocol for a connection starting with the maximum specified protocol and downgrading as necessary to the minimum specified protocol (TLS 1.1 -> TLS 1.0 -> SSL 3.0). BZ 816394
* Add a semaphore lock around retrieving token PINs from the nss_pcachercritten2011-03-021-0/+2
| | | | | | | pipe. Rarely requests to the pipe were getting overridden causing that child to not enable SSL. Fedora bug 677701
* Compare CN value of remote host with requested host in reverse proxy.rcritten2010-05-131-8/+17
| | | | | | Add configuration option to disable this, defaulting to on. 591224
* Add controls for managing SSL renegotiationrcritten2010-03-021-0/+8
| | | | | | | | | NSS is introducing some new controls in response to CVE-2009-3555, MITM attacks via session renegotiation. This patch adds some tuning so these options can be set at run time. Patch contributed by Kai Engert based on some early work by Rob Crittenden.
* If mod_ssl isn't loaded then register the hooks to mod_proxy so we canrcritten2007-10-181-0/+14
| | | | do at least secure proxy in front of an unsecure host.
* Resolves: 241936rcritten2007-05-311-1/+1
| | | | | | | | | | | Bring in some updates based on diffs from 2.0.59 to 2.2.4 - Do explicit TRUE/FALSE tests with sc->enabled to see if SSL is enabled. Don't depend on the fact that TRUE == 1 - Remove some dead code - Minor update to the buffer code that buffers POST data during a renegotation - Optimize setting environment variables by using a switch statement.
* 211612rcritten2006-10-201-0/+9
| | | | Add support for setting a default OCSP responder.
* Merge in changes from http://svn.apache.org/viewvc?view=rev&revision=161958rcritten2006-08-091-2/+5
| | | | | | | | | | | | | | | The issue was that mod_ssl wasn't always picking up ssl-unclean-shutdown settings. This isn't an issue for mod_nss since it doesn't support separate shutdown modes, but this does simplify the code a bit. * mod_nss.h: Remove nss_hook_Translate. * nss_engine_kernel.c (nss_hook_ReadReq): Merge in nss_hook_Translate. (nss_hook_Translate): Remove. * mod_nss.c (nss_register_hooks): Ensure that _ReadReq hook runs after mod_setenvif.c; don't register translate_name hook.
* 200610rcritten2006-08-031-1/+1
| | | | | | | Change the kludge for determining the current version of Apache we're building against. Claim to be building against 2.0.55 if not told otherwise. The exact version matters less than knowing which API to use.
* 196070rcritten2006-06-201-2/+2
| | | | Fix compilation warnings
* Add support for Elliptical Curve Cryptography (ECC). This is disabledrcritten2006-03-021-1/+6
| | | | by default. To enable it, pass --enable-ecc to configure.
* Changes to allow the mod_nss to work in Apache 2.2.0. Based on a patchrcritten2006-01-041-2/+6
| | | | | | | from Oden Eriksson. The conditional to determine which API to use is a bit weak at the moment but it works with Apache 2.0.54 and 2.2.0.
* Add support for seeding the NSS Random Number Generator. This addsrcritten2005-10-031-0/+3
| | | | | a new directive, NSSRandomSeed based on the mod_ssl SSLRandomSeed directive.
* Add proxy support to mod_nss. Most of the changes are related torcritten2005-09-291-31/+98
| | | | | | adding new configuration directives. For the others we need to initialize an NSS socket differently whether we will be acting as a client or a server.
* Add OCSP supportrcritten2005-09-061-0/+3
|
* Add a FIPS configuration option. This enables the FIPS internalrcritten2005-08-191-0/+3
| | | | | database module, configures for SSLv3 and TLSv1 and enables the 2 FIPS ciphers (and disables all the others).
* Changed 2 function names from SSL -> NSS I had missed in earlier cleanuprcritten2005-08-041-2/+2
|
* Add NSS database prefix supportrcritten2005-06-291-0/+3
|
* Changed function and configuration names so mod_nss can peacefullyrcritten2005-05-311-47/+45
| | | | co-exist with mod_ssl.
* By default, don't start with an expired cert. Add optionrcritten2005-05-201-0/+3
| | | | | | SSLEnforceValid Cert on/off to allow one to start with a bad cert. Fix up some error messages and add in a missing cipher.
* Initial import of mod_nssrcritten2005-05-171-0/+342