Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: apache2-mod_nss | Distribution: openSUSE Leap 16.0 |
Version: 1.0.18 | Vendor: openSUSE |
Release: lp160.1.1 | Build date: Thu Jun 20 11:25:06 2024 |
Group: Productivity/Networking/Web/Servers | Build host: reproducible |
Size: 410534 | Source RPM: apache2-mod_nss-1.0.18-lp160.1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://pagure.io/mod_nss | |
Summary: SSL/TLS module for the Apache HTTP server |
The mod_nss module provides strong cryptography for the Apache Web server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols using the Network Security Services (NSS) security library.
Apache-2.0
* Thu Jun 20 2024 pgajdos@suse.com - drop unmaintained apache-rex usage * Wed Nov 25 2020 pgajdos@suse.com - use apache rpm macros * Thu Jun 11 2020 Paolo Stivanin <info@paolostivanin.com> - Add -fcommon in order to fix building with GCC10 * Tue May 12 2020 Vítězslav Čížek <vcizek@suse.com> - Set the minimal apache version to 2.4.18 which is required since 1.0.18 (mod_nss needs conn_rec->master field) * Tue Sep 10 2019 Vítězslav Čížek <vcizek@suse.com> - Use a stronger password in gencert to pass the stricter tests in FIPS mode (bsc#1150133) * https://pagure.io/mod_nss/pull-request/48 * add mod_nss-gencert_stronger_password.patch * Fri Jun 28 2019 Petr Gajdos <pgajdos@suse.com> - use apache-rex in %check * Wed Dec 05 2018 Vítězslav Čížek <vcizek@suse.com> - Update to 1.0.18 * Initial support for new mod_proxy function ssl_engine_set * Fix some warnings from clang * Tue Mar 27 2018 vcizek@suse.com - Update to 1.0.17 * Add TLSv1.3 support * Update documentation for TLS 1.3 * Add TLS 1.3 support to the cipher tests * PEP-8 fixups * Change the default certificate database format to SQLite. * Mon Mar 19 2018 vcizek@suse.com - Use fixed upstream 1.0.16 tarball * https://pagure.io/mod_nss/issue/44 * Mon Mar 19 2018 vcizek@suse.com - Update to 1.0.16 * Fix up some broken cipher strings from a bad merge - adjust distro detection, Tumbleweed has NSS 3.35, Leap 15 has 3.34 - drop 0001-Fix-up-some-broken-cipher-strings-from-a-bad-merge.patch (upstream) * Thu Mar 08 2018 vcizek@suse.com - Since the update to NSS 3.35, the default NSS certificate database format changed from Berkley DB to SQLite - use %license tag * Wed Mar 07 2018 vcizek@suse.com - Update to 1.0.15 * Try to auto-detect the NSS database format if not specified * Update nss_pcache.8 man page to drop directory and prefix * When a token is configured in password file only authenticate once * Return an error when NSSPassPhraseDialog is invalid * Move 3DES ciphers down from HIGH to MEDIUM to match OpenSSL 1.0.2k+ * Add -Werror=implicit-function-declaration to CFLAGS * Handle group membership when testing for file permissions * NSS system-wide policy now disables SSLv3, don't use it in tests * Add missing error messages for libssl errors * Fix doc typo in SSL_[SERVER|CLIENT]_SAN_IPaddr env variable name * When including additional test config use specific extension * Fix the TLS Session ID cache * Make an invalid protocol setting fatal * Don't use same NSS db in nss_pcache as mod_nss, use NSS_NoDB_Init() * Add info log message when FIPS is enabled * Add AES-256 and drop DES, CAST128, SKIPJACK as wrapping key types * Fix removal of CR from PEM certificates * Add OCSP caching and timeout tuning knobs * Check the NSS database directory permissions as well as the files inside it for read access on startup. * Add in simple aliases for ciphers to fix those that don't follow the pattern (dhe_rsa_aes_128_sha256, dhe_rsa_aes_256_sha256) and those with typos (camelia_128_sha, camelia_256_sha) * Fix semaphore leak * Don't set remote user in fixup hook * Drop SSLv2 tests because it is completely disabled now - drop 0001-Handle-group-membership-when-testing-for-file-permis.patch (upstream) - add 0001-Fix-up-some-broken-cipher-strings-from-a-bad-merge.patch * Tue Dec 19 2017 pgajdos@suse.com - buildrequire apr-devel instead of libapr1-devel - buildrequire apr-util-devel instead of libapr-util1-devel * Mon Dec 11 2017 vcizek@suse.com - Fix NSS database startup permission check (bsc#1057776) * add 0001-Handle-group-membership-when-testing-for-file-permis.patch * Thu Dec 07 2017 vcizek@suse.com - drop obsolete mod_nss-dont_disable_SSLV2.patch * bump up minimal NSS version to 3.25, which we now have everywhere - Require iproute2 for ss, which is used by gencert to gather noise * Mon Oct 23 2017 vcizek@suse.com - Use ss instead of the deprecated netstat in gencert (bsc#1064415) * add mod_nss-gencert_use_ss_instead_of_netstat.patch - spec: cleanup and fix URLs * Thu Sep 29 2016 jengelh@inai.de - Avoid changing permissions through symlinks * Thu Sep 15 2016 vcizek@suse.com - don't disable SSLV2, because it doesn't work with NSS 3.24 (boo#993642) * add mod_nss-dont_disable_SSLV2.patch - remove deprecated NSSSessionCacheTimeout option from mod_nss.conf.in (bsc#998176) - change ownership of the gencert generated NSS database so apache can read it (bsc#998180) * add mod_nss-gencert-correct-ownership.patch - use correct configuration path in mod_nss.conf.in (bsc#996282) - remove %post migration code from the old alias directory - generate dummy certificates if there aren't any in mod_nss.d (bsc#998183) * Fri Jul 29 2016 vcizek@suse.com - use systemd-ask-password to prompt for a certificate passphrase (bsc#972968) * drop obsolete mod_nss-bnc863518-reopen_dev_tty.diff * Sat Apr 16 2016 vcizek@suse.com - update to 1.0.14 (fixes boo#973996) * OpenSSL ciphers stopped parsing at +, CVE-2016-3099 * Created valgrind suppression files to ease debugging * Implement SSL_PPTYPE_FILTER to call executables to get the key password pins. Can be used to prompt with systemd. * Improvements to migrate.pl - drop mod_nss_migrate.pl and use upstream migrate script instead * add mod_nss-migrate.patch * Thu Mar 17 2016 vcizek@suse.com - use a whitelist approach for keeping directives in the migration script (bsc#961907) * modify mod_nss_migrate.pl * Wed Mar 16 2016 pgajdos@suse.com - fix test: add NSSPassPhraseDialog, point it to plain file * Mon Mar 14 2016 vcizek@suse.com - update to 1.0.13 Update default ciphers to something more modern and secure Check for host and netstat commands in gencert before trying to use them Add server support for DHE ciphers Extract SAN from server/client certificates into env Fix memory leaks and other coding issues caught by clang analyzer Add support for Server Name Indication (SNI) (#1010751) Add support for SNI for reverse proxy connections Add RenegBufferSize? option Add support for TLS Session Tickets (RFC 5077) Fix logical AND support in OpenSSL cipher compatibility Correctly handle disabled ciphers (CVE-2015-5244) Implement a slew more OpenSSL cipher macros Fix a number of illegal memory accesses and memory leaks Support for SHA384 ciphers if they are available in NSS Add compatibility for mod_ssl-style cipher definitions (#862938) Add TLSv1.2-specific ciphers Completely remove support for SSLv2 Add support for sqlite NSS databases (#1057650) Compare subject CN and VS hostname during server start up Add support for enabling TLS v1.2 Don't enable SSL 3 by default (CVE-2014-3566) Fix CVE-2013-4566 Move nss_pcache to /usr/libexec Support httpd 2.4+ - drop almost all our patches (upstream) * 0001-SNI-check-with-NameVirtualHosts.patch * mod_nss-CVE-2013-4566-NSSVerifyClient.diff * mod_nss-PK11_ListCerts_2.patch * mod_nss-add_support_for_enabling_TLS_v1.2.patch * mod_nss-array_overrun.patch * mod_nss-cipherlist_update_for_tls12-doc.diff * mod_nss-cipherlist_update_for_tls12.diff * mod_nss-clientauth.patch * mod_nss-compare_subject_CN_and_VS_hostname.patch * mod_nss-gencert.patch * mod_nss-httpd24.patch * mod_nss-lockpcache.patch * mod_nss-negotiate.patch * mod_nss-no_shutdown_if_not_init_2.patch * mod_nss-overlapping_memcpy.patch * mod_nss-pcachesignal.h * mod_nss-proxyvariables.patch * mod_nss-reseterror.patch * mod_nss-reverse_proxy_send_SNI.patch * mod_nss-reverseproxy.patch * mod_nss-sslmultiproxy.patch * mod_nss-tlsv1_1.patch * mod_nss-wouldblock.patch * update-ciphers.patch - add automake and libtool to BuildRequires - temporarily comment out %check * Tue Jan 12 2016 pgajdos@suse.com - %check: access syntax depends on %{apache_branch} * Fri Dec 11 2015 pgajdos@suse.com - %{apache_branch} converted to number * Wed Oct 14 2015 pgajdos@suse.com - mod_nss-httpd24.patch applied depending on %{apache_branch} instead of %{suse_version}, fixes build for sle11 with new apache * Fri Oct 02 2015 pgajdos@suse.com - test module with %apache_test_module_curl * Mon Sep 07 2015 vcizek@suse.com - unified ciphers with SLE-12 * modified patches: mod_nss-cipherlist_update_for_tls12-doc.diff mod_nss-cipherlist_update_for_tls12.diff update-ciphers.patch * Mon Sep 07 2015 vcizek@suse.com - send TLS server name extension on proxy connections (bsc#933832) * added mod_nss-reverse_proxy_send_SNI.patch - updates to the SNI code (from Stanislav Tokos): update update-ciphers.patch (bsc#928039) merge changes from the mod_nss-SNI_support.patch to: 0001-SNI-check-with-NameVirtualHosts.patch (bnc#927402) abstract hash for NSSNickname and ServerName, add ServerAliases and Wild Cards for vhost (bsc#927402, bsc#928039, bsc#930922) replace SSL_SNI_SEND_ALERT by nss_die (cleaner solution for virtual hosts) (bsc#930186) add alert about permission on the certificate database (bsc#933265) * Thu Jul 16 2015 pgajdos@suse.com - Requries: %{apache_suse_maintenance_mmn} This will pull this module to the update (in released distribution) when apache maintainer thinks it is good (due api/abi changes). * Mon May 18 2015 hguo@suse.com - The package does not carry any .conf files underneath /etc/apache2/mod_nss.d, therefore use 'IncludeOptional' instead of 'Include' directory in mod_nss.conf. * Thu May 07 2015 kstreitova@suse.com - change of url and source address * Wed Apr 01 2015 kstreitova@suse.com - remove "ecdhe_rsa_aes_256_sha256" cipher from the mod_nss.conf.in file as this cipher is not supported and it was listed here incorrectly [bnc#921182] * Tue Mar 03 2015 kstreitova@suse.com - add mod_nss-SNI_support.patch that brings Server Name Indication support that allows to have multiple HTTPS websites with multiple certificates on the same IP address and port. [fate#318331], [bnc#897712] * Tue Nov 04 2014 kstreitova@suse.com - bnc#902068: added mod_nss-add_support_for_enabling_TLS_v1.2.patch that adding small fixes for support of TLS v1.2 * Wed Oct 29 2014 kstreitova@suse.com - bnc#897712: added mod_nss-compare_subject_CN_and_VS_hostname.patch that compare CN and VS hostname (use NSS library). Removed following patches: * mod_nss-SNI-checks.patch * mod_nss-SNI-callback.patch * Thu Aug 21 2014 meissner@suse.com - mod_nss-cipherlist_update_for_tls12-doc.diff, mod_nss-cipherlist_update_for_tls12.diff, mod_nss.conf.in: Added more TLS 1.2 ciphers, the CBC with SHA256. * Thu Jul 24 2014 draht@suse.de - mod_nss-bnc863518-reopen_dev_tty.diff: close(0) and open("/dev/tty", ...) to make sure that stdin can be read from. startproc may inherit wrongly opened file descriptors to httpd. (Note: An analogous fix exists in startproc(8), too.) [bnc#863518] - VirtualHost part in /etc/apache2/conf.d/mod_nss.conf is now externalized to /etc/apache2/conf.d/vhost-nss.template and not activated/read by default. [bnc#878681] - NSSCipherSuite update following additional ciphers of Feb 18 change. [bnc#878681] * Fri Jun 27 2014 draht@suse.de - mod_nss-SNI-callback.patch, mod_nss-SNI-checks.patch: server side SNI was not implemented when mod_nss was made; patches implement SNI with checks if SNI provided hostname equals Host: field in http request header. * Tue Feb 18 2014 draht@suse.de - mod_nss-cipherlist_update_for_tls12-doc.diff mod_nss-cipherlist_update_for_tls12.diff GCM mode and Camellia ciphers added to the supported ciphers list. The additional ciphers are: rsa_aes_128_gcm_sha == TLS_RSA_WITH_AES_128_GCM_SHA256 rsa_camellia_128_sha == TLS_RSA_WITH_CAMELLIA_128_CBC_SHA rsa_camellia_256_sha == TLS_RSA_WITH_CAMELLIA_256_CBC_SHA ecdh_ecdsa_aes_128_gcm_sha == TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 ecdhe_ecdsa_aes_128_gcm_sha == TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ecdh_rsa_aes_128_gcm_sha == TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 ecdhe_rsa_aes_128_gcm_sha == TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [bnc#863035] * Fri Nov 29 2013 draht@suse.de - mod_nss-CVE-2013-4566-NSSVerifyClient.diff fixes CVE-2013-4566: If 'NSSVerifyClient none' is set in the server / vhost context (i.e. when server is configured to not request or require client certificate authentication on the initial connection), and client certificate authentication is expected to be required for a specific directory via 'NSSVerifyClient require' setting, mod_nss fails to properly require certificate authentication. Remote attacker can use this to access content of the restricted directories. [bnc#853039] * Fri Nov 08 2013 draht@suse.de - glue documentation added to /etc/apache2/conf.d/mod_nss.conf: * simultaneaous usage of mod_ssl and mod_nss * SNI concurrency * SUSE framework for apache configuration, Listen directive * module initialization - mod_nss-conf.patch obsoleted by scratch-version of nss.conf.in or mod_nss.conf, respectively. This also leads to the removal of nss.conf.in specific chunks in mod_nss-negotiate.patch and mod_nss-tlsv1_1.patch . - mod_nss_migrate.pl conversion script added; not patched from source, but partially rewritten. - README-SUSE.txt added with step-by-step instructions on how to convert and manage certificates and keys, as well as a rationale about why mod_nss was included in SLES. - package ready for submission [bnc#847216] * Tue Nov 05 2013 draht@suse.de - generic cleanup of the package: - explicit Requires: to mozilla-nss >= 3.15.1, as TLS-1.2 support came with this version - this is the objective behind this version update of apache2-mod_nss. Tracker bug [bnc#847216] - change path /etc/apache2/alias to /etc/apache2/mod_nss.d to avoid ambiguously interpreted name of directory. - merge content of /etc/apache2/alias to /etc/apache2/mod_nss.d if /etc/apache2/alias exists. - set explicit filemodes 640 for %post generated *.db files in /etc/apache2/mod_nss.d * Fri Aug 02 2013 meissner@suse.com - mod_nss-tlsv1_1.patch: nss.conf.in missed for TLSv1.2 default. - mod_nss-clientauth.patch: merged from RHEL6 pkg - mod_nss-PK11_ListCerts_2.patch: merged from RHEL6 pkg - mod_nss-no_shutdown_if_not_init_2.patch: merged from RHEL6 pkg - mod_nss-sslmultiproxy.patch: merged from RHEL6 pkg - make it build on both Apache2 2.4 and 2.2 systems * Thu Aug 01 2013 meissner@suse.com - Add support for TLS v1.1 and TLS v1.2 (TLS v1.2 requires mozilla nss 3.15.1 or newer.) - merged in mod_nss-proxyvariables.patch and mod_nss-tlsv1_1.patch from redhat to allow tls v1.1 too. - ported the tls v1.1 patch to be tls v1.2 aware - added mod_nss-proxyvariables.patch (from RHEL6 package) - added mod_nss-tlsv1_1.patch (from RHEL6 package, enhanced with TLS 1.2) - mod_nss-array_overrun.patch: from RHEL6 package, fixed a array index overrun * Fri Jul 12 2013 aj@ajaissle.de - Changed source to original tar.gz * Thu Jul 11 2013 aj@ajaissle.de - Added mod_nns-httpd24.patch to support build with apache 2.4 * Tue Jan 22 2013 aj@ajaissle.de - Changed mod_nss-conf.patch to adjust mod_nss.conf to match SUSE dir layout [bnc#799483] - Cleaned up license tag * Sun Apr 15 2012 wr@rosenauer.org - import some patches from Fedora - removed autoreconf call * Wed Feb 17 2010 nix@opensuse.org - Fix mod_nss-conf.patch to work on SUSE - Rename package from mod_nss to apache2-mod_nss
/etc/apache2/conf.d/mod_nss.conf /etc/apache2/listen_nss.conf /etc/apache2/mod_nss.d /etc/apache2/mod_nss.d/cert9.db /etc/apache2/mod_nss.d/install.log /etc/apache2/mod_nss.d/key4.db /etc/apache2/mod_nss.d/pkcs11.txt /etc/apache2/vhosts.d/vhost-nss.template /usr/lib64/apache2 /usr/lib64/apache2/mod_nss.so /usr/sbin/gencert /usr/sbin/mod_nss_migrate.pl /usr/sbin/nss_pcache /usr/share/doc/packages/apache2-mod_nss /usr/share/doc/packages/apache2-mod_nss/README /usr/share/doc/packages/apache2-mod_nss/README-SUSE.txt /usr/share/doc/packages/apache2-mod_nss/mod_nss.html /usr/share/licenses/apache2-mod_nss /usr/share/licenses/apache2-mod_nss/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Nov 12 00:13:41 2024