You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2015/02/11 10:18:35 UTC
[Bug 57566] New: The standardized DH parameters applied based on the
certificate's RSA/DSA key size are not correct when using both RSA and ECC
certificates
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566
Bug ID: 57566
Summary: The standardized DH parameters applied based on the
certificate's RSA/DSA key size are not correct when
using both RSA and ECC certificates
Product: Apache httpd-2
Version: 2.4.10
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: mod_ssl
Assignee: bugs@httpd.apache.org
Reporter: ztlizitian@gmail.com
Apache-2.4.7 added the feature: the DH standardized parameters are applied
based on the certificate's RSA/DSA key size.
The DH parameters for something like TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
applied based on the certificate's RSA/DSA key size is 2048-bit if I use only a
2048-bit RSA certificate.
But the DH parameters applied based on the certificate's RSA/DSA key size is
1024-bit if I use both a 2048-bit RSA certificate and a 256-bit ECC certificate
AND Use "SSLCertificateFile ecc.crt" AFTER "SSLCertificateFile rsa.crt" in
config file.
I think it should ignore the ECC certificate's key size and generates the DH
parameter which length is same as the RSA certificate.
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org
[Bug 57566] The standardized DH parameters applied based on the
certificate's RSA/DSA key size are not correct when using both RSA and ECC
certificates
Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566
Zitian Li <zt...@gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|INVALID |---
--- Comment #2 from Zitian Li <zt...@gmail.com> ---
Now I have recompiled 2.4.12 with openssl 1.0.2.
DH param is 2048-bit now but ECDH param becomes 571-bit.
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org
[Bug 57566] The standardized DH parameters applied based on the
certificate's RSA/DSA key size are not correct when using both RSA and ECC
certificates
Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566
--- Comment #4 from Zitian Li <zt...@gmail.com> ---
(In reply to Kaspar Brand from comment #3)
> Of course. ECDHE_ECDSA is definitely not the same as DHE_RSA (and neither is
> ECDHE_RSA). I suggest you study RFCs 4492 and 5246, e.g.
What I mean is, if I use a single 256-bit ECC certificate, the EC param is
256-bit. But if I use both 2048-bit RSA and 256-bit ECC certificate, AND Use
"SSLCertificateFile ecc.crt" AFTER "SSLCertificateFile rsa.crt" in config file,
the EC param of ECDHE_ECDSA and ECDHE_RSA is 571-bit.
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org
[Bug 57566] The standardized DH parameters applied based on the
certificate's RSA/DSA key size are not correct when using both RSA and ECC
certificates
Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566
Kaspar Brand <as...@velox.ch> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |INVALID
--- Comment #1 from Kaspar Brand <as...@velox.ch> ---
This is a limitation of OpenSSL up to 1.0.1. It is fixed in 2.4.10 when
compiled mod_ssl against OpenSSL 1.0.2 (r1588851 is the backport to 2.4.x).
See also this thread on the dev list:
https://mail-archives.apache.org/mod_mbox/httpd-dev/201404.mbox/%3C53521571.6020804@velox.ch%3E
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org
[Bug 57566] The standardized DH parameters applied based on the
certificate's RSA/DSA key size are not correct when using both RSA and ECC
certificates
Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=57566
Kaspar Brand <as...@velox.ch> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
Resolution|--- |INVALID
--- Comment #3 from Kaspar Brand <as...@velox.ch> ---
(In reply to Zitian Li from comment #2)
> but ECDH param becomes 571-bit.
Of course. ECDHE_ECDSA is definitely not the same as DHE_RSA (and neither is
ECDHE_RSA). I suggest you study RFCs 4492 and 5246, e.g.
ASF Bugzilla is for reporting httpd bugs, not for user support.
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org