| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
| |
NSS is introducing some new controls in response to CVE-2009-3555,
MITM attacks via session renegotiation. This patch adds some tuning
so these options can be set at run time.
Patch contributed by Kai Engert based on some early work by Rob
Crittenden.
|
|
|
|
|
|
|
| |
entire configuration state. Other modules were relying on mod_nss
leaving NSS initialized.
453508
|
|
|
|
|
|
| |
Don't initialize the database if the SSL is disabled in the configuration
454701
|
|
|
|
|
|
|
|
|
|
| |
1. In nss_init_SSLLibrary() the server config wasn't being set properly
for each virtual server so FIPS wasn't getting turned on.
2. There seem to be a problem in NSS_Shutdown() that makes subsequent
logins appear to succeed but they actually are skipped causing keys
and certs to not be available.
Also switch an error message to a warning related to FIPS ciphers.
|
|
|
|
|
|
|
|
|
| |
token. It apparently always did this for hardware tokens as it is part
of the PKCS#11 spec.
This moves the initialization code into the child process init function.
444348
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Bring in some updates based on diffs from 2.0.59 to 2.2.4
- Do explicit TRUE/FALSE tests with sc->enabled to see if SSL is enabled.
Don't depend on the fact that TRUE == 1
- Remove some dead code
- Minor update to the buffer code that buffers POST data during a
renegotation
- Optimize setting environment variables by using a switch statement.
|
|
|
|
| |
Fix typo in cipher echde_rsa_null (transposed h and d).
|
|
|
|
|
|
| |
The way I was using to detect the model being used was incorrect. Now
use the # of threads available. Guaranteed to be 0 for prefork and > 0 for
worker (threaded)
|
|
|
|
| |
Don't fire up the NSS engine if SSL isn't enabled.
|
|
|
|
| |
Add support for setting a default OCSP responder.
|
|
|
|
|
| |
Only call NSS_Shutdown when we've initialized the database.
Also update the NSS log messages to those added in NSS 3.11.3.
|
|
|
|
|
|
| |
was being triggered during the first module unload when calling
NSS_Shutdown because the cache wasn't finished setting itself up
in MP mode.
|
|
|
|
|
|
|
| |
Turns out I didn't need to defer startup at all, the LogLevel in nss.conf
was enough. I actually had the compare reversed anyway, but that was
the least of the problem. 30% of the time the server would core during
shutdown due to a race condition.
|
|
|
|
|
|
|
|
|
|
|
| |
Defer loading the server certificates until the 2nd module load. Otherwise
any problems with said certificate(s) will not be displayed because
the VirtualHost logging hasn't been turned on yet.
Switch a slew of APLOG_INFO to APLOG_ERR.
And add a default LogLevel to nss.conf.in. This is not inherited from
httpd.conf.
|
|
|
|
|
| |
Fix some warnings related to not checking the return value of
getcwd and chdir.
|
|
|
|
| |
Fix compilation warnings
|
|
|
|
| |
Replace C++ style comments to make the Sun Forte compiler happy.
|
|
|
|
| |
by default. To enable it, pass --enable-ecc to configure.
|
|
|
|
|
|
| |
more than once. This avoids a crash during shutdown where the same
certificates and keys will try to be released multiple times. This is
based on ssl_init_server_check() from mod_ssl.
|
|
|
|
|
| |
correct an error where the PKCS#11 slot isn't closed unless a the
certificate key is obtained. This also affected NSS_Shutdown().
|
|
|
|
|
| |
a new directive, NSSRandomSeed based on the mod_ssl SSLRandomSeed
directive.
|
|
|
|
|
|
| |
adding new configuration directives. For the others we need to
initialize an NSS socket differently whether we will be acting as a
client or a server.
|
| |
|
|
|
|
|
|
|
|
|
| |
- The NSS ciphers are enumerated to find those that are FIPS approved
- This list of approved ciphers is compared to the NSSCipherSuite entry
and those enabled, approved ciphers are configured. This way you aren't
forced to use all of the FIPS ciphers (in case you don't want a
56-bit cipher enabled).
- Only TLSv1 should be enabled.
|
| |
|
|
|
|
|
| |
database module, configures for SSLv3 and TLSv1 and enables the
2 FIPS ciphers (and disables all the others).
|
|
|
|
|
|
| |
If we are using the forked model, use the MP version of the Session ID
cache.
Don't call PR_Cleanup(), this could cause problems.
|
| |
|
| |
|
| |
|
|
|
|
| |
co-exist with mod_ssl.
|
|
|
|
| |
certificate to match what OpenSSL does.
|
|
|
|
|
|
| |
SSLEnforceValid Cert on/off to allow one to start with a bad cert.
Fix up some error messages and add in a missing cipher.
|
|
|