Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Mike Frysinger <vapier@gentoo.org>
To: buildroot@busybox.net
Subject: [Buildroot] [psa] various server software upgrades
Date: Mon, 7 Dec 2015 17:54:08 -0500	[thread overview]
Message-ID: <20151207225408.GC24430@vapier.lan> (raw)
In-Reply-To: <87egexoqf4.fsf@dell.be.48ers.dk>

On 07 Dec 2015 23:16, Peter Korsgaard wrote:
> >>>>> "Mike" == Mike Frysinger <vapier@gentoo.org> writes:
> 
>  >> I would actually prefer if we only enforce https where it matters,
>  >> E.G. on bugs.*. We can (and SHOULD now that we've uses the HSTS headers)
>  >> support https on the other subdomains, but I don't think we should
>  >> redirect http to https.
> 
>  > i guess we disagree on the "where it matters" part.  any unencrypted
>  > connection can be injected with ads/javascript which can redirect the
>  > content to any site or capture any state the user has.
> 
> Well, what I mean is that this is always about trade offs. The risk of
> man in the middle attacks / ads vs the risks of various breakage because
> of missing/invalid certs/old clients/whatever.
> 
> Bugzilla is a bit special as we have user authentication, the other sub
> domains less so.
> 
> Don't get me wrong, I find it very good that we are improving the
> security situation - I just would prefer we keep the amount of breakage
> to a minimum while we configure this.
> 
> So how about if we drop the global HSTS headers and http->https
> redirects for now and then move a bit more slowly forward sub domain by
> subdomain:
> 
> 1: Enable https next to http and verify that it works
> 2: Add http->https redirect and verify that it works
> 3: add HSTS header

we're already at (3).  even if we weren't, i don't see how transitioning
would affect the SNI issue.  the question is simple: how long do you want
to (try to) support old systems where people refuse to fix their setup ?
we're talking about systems that are over three years old (wget-1.14 was
released in Aug 2012).  what is your cut off ?  3 years ?  4 years ?  i'd
also highlight <wget-1.16 versions have@least one security vuln that
can be remotely exploited (when you download via ftp -- CVE-2014-4877).

>  > imo, if a dev's system is so old it doesn't support SNI, then it's their
>  > problem to workaround it.  even if they get the latest buildroot version,
>  > they're going to keep having the same problem when they try to download
>  > and build software as other servers use SNI.  are we now responsible for
>  > bootstrapping openssl/ca-certificates/wget as host tools so SNI/etc...
>  > are supported ?  how do you get the software for those packages in order
>  > to bootstrap ?  do you bundle the openssl/ca-certificates/wget tarballs
>  > inside of buildroot itself ?  let's just rip the band aid off and be done.
> 
> I agree, old systems are a pain - But we do try to keep buildroot
> working on various enterprise distributions when possible. So far we've
> worked around SNI issues by using http URLs from those locations instead
> (and verifying against our local hashes).

that doesn't help when sites transition to http->https redirects such as
uclibc.org now does.
-mike
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20151207/72336cb1/attachment.asc>

  reply	other threads:[~2015-12-07 22:54 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-12-02  7:35 [Buildroot] [psa] various server software upgrades Mike Frysinger
2015-12-02  7:58 ` Lionel Orry
2015-12-02  8:43   ` Peter Korsgaard
2015-12-02  9:25 ` Nikolay Dimitrov
2015-12-02  9:28   ` Nikolay Dimitrov
2015-12-02 17:31   ` Mike Frysinger
2015-12-02 18:38     ` Nikolay Dimitrov
2015-12-06 21:42 ` Yann E. MORIN
2015-12-06 22:00   ` Peter Korsgaard
2015-12-07  1:55     ` Mike Frysinger
2015-12-07  6:34       ` Peter Korsgaard
2015-12-07 18:51         ` Mike Frysinger
2015-12-07 20:37           ` Peter Korsgaard
2015-12-07 21:55             ` Mike Frysinger
2015-12-07 22:16               ` Peter Korsgaard
2015-12-07 22:54                 ` Mike Frysinger [this message]
2015-12-07 23:02                   ` Yann E. MORIN
2015-12-07 23:22                     ` Mike Frysinger
2015-12-08  7:52                       ` Peter Korsgaard
2015-12-08 16:40                         ` Mike Frysinger
2015-12-08 16:43                           ` Peter Korsgaard
2015-12-08 17:27                             ` Mike Frysinger
2015-12-08  7:50                   ` Peter Korsgaard
2015-12-08  0:17                 ` Mike Frysinger
2015-12-08  7:55                   ` Peter Korsgaard
2015-12-08 16:38                     ` Mike Frysinger
2015-12-07  8:00       ` Peter Korsgaard
2015-12-07  8:23         ` Peter Korsgaard
2015-12-07 18:52         ` Mike Frysinger
2015-12-07 19:57           ` Mike Frysinger
2015-12-07 19:59             ` Yann E. MORIN
2015-12-07 23:52               ` Mike Frysinger
2015-12-07 20:42           ` Peter Korsgaard

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20151207225408.GC24430@vapier.lan \
    --to=vapier@gentoo.org \
    --cc=buildroot@busybox.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox