You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2015/02/11 10:18:35 UTC

[Bug 57566] New: The standardized DH parameters applied based on the certificate's RSA/DSA key size are not correct when using both RSA and ECC certificates

https://issues.apache.org/bugzilla/show_bug.cgi?id=57566

            Bug ID: 57566
           Summary: The standardized DH parameters applied based on the
                    certificate's RSA/DSA key size are not correct when
                    using both RSA and ECC certificates
           Product: Apache httpd-2
           Version: 2.4.10
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: mod_ssl
          Assignee: bugs@httpd.apache.org
          Reporter: ztlizitian@gmail.com

Apache-2.4.7 added the feature: the DH standardized parameters are applied
based on the certificate's RSA/DSA key size.

The DH parameters for something like TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
applied based on the certificate's RSA/DSA key size is 2048-bit if I use only a
2048-bit RSA certificate.

But the DH parameters applied based on the certificate's RSA/DSA key size is
1024-bit if I use both a 2048-bit RSA certificate and a 256-bit ECC certificate
AND Use "SSLCertificateFile ecc.crt" AFTER "SSLCertificateFile rsa.crt" in
config file.

I think it should ignore the ECC certificate's key size and generates the DH
parameter which length is same as the RSA certificate.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


[Bug 57566] The standardized DH parameters applied based on the certificate's RSA/DSA key size are not correct when using both RSA and ECC certificates

Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566

Zitian Li <zt...@gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|INVALID                     |---

--- Comment #2 from Zitian Li <zt...@gmail.com> ---
Now I have recompiled 2.4.12 with openssl 1.0.2.
DH param is 2048-bit now but ECDH param becomes 571-bit.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


[Bug 57566] The standardized DH parameters applied based on the certificate's RSA/DSA key size are not correct when using both RSA and ECC certificates

Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566

--- Comment #4 from Zitian Li <zt...@gmail.com> ---
(In reply to Kaspar Brand from comment #3)
> Of course. ECDHE_ECDSA is definitely not the same as DHE_RSA (and neither is
> ECDHE_RSA). I suggest you study RFCs 4492 and 5246, e.g.

What I mean is, if I use a single 256-bit ECC certificate, the EC param is
256-bit. But if I use both 2048-bit RSA and 256-bit ECC certificate, AND Use
"SSLCertificateFile ecc.crt" AFTER "SSLCertificateFile rsa.crt" in config file,
the EC param of ECDHE_ECDSA and ECDHE_RSA is 571-bit.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


[Bug 57566] The standardized DH parameters applied based on the certificate's RSA/DSA key size are not correct when using both RSA and ECC certificates

Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566

Kaspar Brand <as...@velox.ch> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |INVALID

--- Comment #1 from Kaspar Brand <as...@velox.ch> ---
This is a limitation of OpenSSL up to 1.0.1. It is fixed in 2.4.10 when
compiled mod_ssl against OpenSSL 1.0.2 (r1588851 is the backport to 2.4.x).

See also this thread on the dev list:

https://mail-archives.apache.org/mod_mbox/httpd-dev/201404.mbox/%3C53521571.6020804@velox.ch%3E

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


[Bug 57566] The standardized DH parameters applied based on the certificate's RSA/DSA key size are not correct when using both RSA and ECC certificates

Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566

Kaspar Brand <as...@velox.ch> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|REOPENED                    |RESOLVED
         Resolution|---                         |INVALID

--- Comment #3 from Kaspar Brand <as...@velox.ch> ---
(In reply to Zitian Li from comment #2)
> but ECDH param becomes 571-bit.

Of course. ECDHE_ECDSA is definitely not the same as DHE_RSA (and neither is
ECDHE_RSA). I suggest you study RFCs 4492 and 5246, e.g.

ASF Bugzilla is for reporting httpd bugs, not for user support.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org