Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Peter Korsgaard <peter@korsgaard.com>
To: buildroot@busybox.net
Subject: [Buildroot] [psa] various server software upgrades
Date: Mon, 07 Dec 2015 23:16:31 +0100	[thread overview]
Message-ID: <87egexoqf4.fsf@dell.be.48ers.dk> (raw)
In-Reply-To: <20151207215548.GB24430@vapier.lan> (Mike Frysinger's message of "Mon, 7 Dec 2015 16:55:48 -0500")

>>>>> "Mike" == Mike Frysinger <vapier@gentoo.org> writes:

Hi,

 >> (this is with wget 1.12 from 2009).
 >> 
 >> Now, this isn't about the letsencrypt CA as such, but presumably because
 >> it doesn't understand SNI - But the end result is the same.

 > right, this has nothing to do with any CA, it's because that version lacks
 > SNI support.  the current buildroot.org cert is only for that domain, and
 > buildroot.org/downloads is off that vhost.  but the client has to support
 > SNI to select the correct vhost during the SSL handshaking otherwise it is
 > sent to the default ("bugs.busybox.net" in this case).

Indeed.

 >> I would actually prefer if we only enforce https where it matters,
 >> E.G. on bugs.*. We can (and SHOULD now that we've uses the HSTS headers)
 >> support https on the other subdomains, but I don't think we should
 >> redirect http to https.

 > i guess we disagree on the "where it matters" part.  any unencrypted
 > connection can be injected with ads/javascript which can redirect the
 > content to any site or capture any state the user has.

Well, what I mean is that this is always about trade offs. The risk of
man in the middle attacks / ads vs the risks of various breakage because
of missing/invalid certs/old clients/whatever.

Bugzilla is a bit special as we have user authentication, the other sub
domains less so.

Don't get me wrong, I find it very good that we are improving the
security situation - I just would prefer we keep the amount of breakage
to a minimum while we configure this.

So how about if we drop the global HSTS headers and http->https
redirects for now and then move a bit more slowly forward sub domain by
subdomain:

1: Enable https next to http and verify that it works
2: Add http->https redirect and verify that it works
3: add HSTS header


 > imo, if a dev's system is so old it doesn't support SNI, then it's their
 > problem to workaround it.  even if they get the latest buildroot version,
 > they're going to keep having the same problem when they try to download
 > and build software as other servers use SNI.  are we now responsible for
 > bootstrapping openssl/ca-certificates/wget as host tools so SNI/etc...
 > are supported ?  how do you get the software for those packages in order
 > to bootstrap ?  do you bundle the openssl/ca-certificates/wget tarballs
 > inside of buildroot itself ?  let's just rip the band aid off and be done.

I agree, old systems are a pain - But we do try to keep buildroot
working on various enterprise distributions when possible. So far we've
worked around SNI issues by using http URLs from those locations instead
(and verifying against our local hashes).


 >> You cannot visit lists.busybox.net right now because the website uses
 >> HSTS. Network errors and attacks are usually temporary, so this page
 >> will probably work later.
 >> 
 >> NET::ERR_CERT_COMMON_NAME_INVALID
 >> 
 >> With no option of continuing.

 > mine has an "Advanced" link after that which includes "Proceed".  i went
 > to bugs.busybox.net first, then to lists.busybox.net, and it worked fine.

I can do that as well in iceweasel, but not in Chromium :/

-- 
Venlig hilsen,
Peter Korsgaard 

  reply	other threads:[~2015-12-07 22:16 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-12-02  7:35 [Buildroot] [psa] various server software upgrades Mike Frysinger
2015-12-02  7:58 ` Lionel Orry
2015-12-02  8:43   ` Peter Korsgaard
2015-12-02  9:25 ` Nikolay Dimitrov
2015-12-02  9:28   ` Nikolay Dimitrov
2015-12-02 17:31   ` Mike Frysinger
2015-12-02 18:38     ` Nikolay Dimitrov
2015-12-06 21:42 ` Yann E. MORIN
2015-12-06 22:00   ` Peter Korsgaard
2015-12-07  1:55     ` Mike Frysinger
2015-12-07  6:34       ` Peter Korsgaard
2015-12-07 18:51         ` Mike Frysinger
2015-12-07 20:37           ` Peter Korsgaard
2015-12-07 21:55             ` Mike Frysinger
2015-12-07 22:16               ` Peter Korsgaard [this message]
2015-12-07 22:54                 ` Mike Frysinger
2015-12-07 23:02                   ` Yann E. MORIN
2015-12-07 23:22                     ` Mike Frysinger
2015-12-08  7:52                       ` Peter Korsgaard
2015-12-08 16:40                         ` Mike Frysinger
2015-12-08 16:43                           ` Peter Korsgaard
2015-12-08 17:27                             ` Mike Frysinger
2015-12-08  7:50                   ` Peter Korsgaard
2015-12-08  0:17                 ` Mike Frysinger
2015-12-08  7:55                   ` Peter Korsgaard
2015-12-08 16:38                     ` Mike Frysinger
2015-12-07  8:00       ` Peter Korsgaard
2015-12-07  8:23         ` Peter Korsgaard
2015-12-07 18:52         ` Mike Frysinger
2015-12-07 19:57           ` Mike Frysinger
2015-12-07 19:59             ` Yann E. MORIN
2015-12-07 23:52               ` Mike Frysinger
2015-12-07 20:42           ` Peter Korsgaard

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87egexoqf4.fsf@dell.be.48ers.dk \
    --to=peter@korsgaard.com \
    --cc=buildroot@busybox.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox