/srv/irclogs.ubuntu.com/2020/03/09/#ubuntu-server.txt

lordievaderGood morning08:55
MJCD_hey all09:49
MJCD_i'm still on a CLI based quickmenu style thing09:49
MJCD_a basic gui that probably implements menu.lst or w/e09:49
MJCD_but for the command line, there were many pre-windows things like this09:50
MJCD_searching it I only really find "install xorg"09:50
MJCD_and that's not at all what i'm after09:50
thelounge7666I'm still having an issue where systemd-networkd will not re-aquire an IP address if the link goes down, even after restarting the service. only a reboot works. any thoughts?11:53
=== genii_ is now known as genii
rbasakahasenack: do we understand enough about bug 1865900 to mark it Triaged? I think we do?17:42
ubottubug 1865900 in apache2 (Ubuntu) "apache 2.4.29-1ubuntu4.12 authentication with client certificate broken" [Undecided,Incomplete] https://launchpad.net/bugs/186590017:42
tewardrbasak: mind if I take a look at that?17:46
tewardbecause i've been doing client auth stuff regularly currently and might be able to provide insight/debugs17:46
tewardon ${MULTIPLE_SOFTWARE_ENDPOINTS)17:46
tewardrbasak: is it possible that the issue isn't Apache side?  (https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1834671 is linked by mdeslaur)17:47
ubottuLaunchpad bug 1834671 in firefox (Ubuntu Eoan) "TLSv1.3 client certificate authentication with renegotiation unsupported in browsers" [Undecided,Fix released]17:47
rbasakteward: indeed17:53
rbasakI just wanted it out of Incomplete status :)17:53
tewardrbasak: well if the issue is $CLIENT and not $SERVER then it's Invalid for Apache17:54
tewardnot Triaged.17:54
tewardunless i'm missing something?17:54
teward(has Apache2 been rebuilt against OpenSSL 1.1.1?)17:54
sdezielteward: yes, rebuilt after having TLS 1.3 support backported to Bionic17:55
ahasenackrbasak: just saw your ping now18:24
ahasenackteward: I think it's not an apache issue, unless we are willing to disable TLS 1.318:24
ahasenackwhich defeats the point of the SRU that brought it in18:24
tewardahasenack: well for nginx18:24
tewardin the SRU we *disabled* NGINX TLS 1.3 by default by simply rebuilding against SSL18:25
ahasenackwell, apache had an sru specifically to enable tls1.3, with backported patches and all18:25
tewardyeah i'd nACK that18:25
tewarda similar SRU came in for NGINX18:25
tewardto enable 1.3 by default18:26
tewardand we NACK'd that18:26
ahasenackthat's the only remaining reason to have an apache task: if we want to revert that18:26
ahasenackrbasak: ^18:26
ahasenackif not, then we will need tasks for all clients that broke18:26
ahasenackthe fix for that could be to implement pha, or not not use tls1.3 when doing certificate auth18:27
ahasenacks/not not/to not/18:27
tewardahasenack: with nginx, we simply disabled TLS1.3 in the ssl_protocols - is there a way to do that in Apache, that is keep TLS1.3 support but disable it on the default available protocols18:35
tewardthat way users can still *enable* TLS1.3 but on a selective basis instead of by default18:35
tewardI had extensive discussion with mdeslaur and rbasak and sarnold on this from a security perspective18:35
tewardand we decided to not backport the TLSv1.3 enablement18:36
teward(but compile nginx against TLS1.3 so we can allow availability)18:36
mdeslaurI don't think we should revert tlsv1.3 just for the few uses of client side certs18:37
ahasenackteward: maybe if it's removed from the "ALL" keyword18:37
rbasakI just wanted to get past triage!18:37
rbasakCan I mark it New again at least, pending further discussion?18:37
ahasenackrbasak: if you mark it new, it will get back into triage18:37
tewardahasenack: well replace "ALL" with -SSLv2 -SSLv3 +TLS1.0 +TLS1.1 +TLS1.2 for the defaults18:37
tewardwhich is, you know, what we do in nginx-conf18:38
tewardbecause otherwise it defaults to "ALL" behind the scenes18:38
tewardwhich for obvious reasons is "Bad"18:38
ahasenackif pha is part of tls1.3, and some client can't do pha, then that client should perhaps have tls 1.3 removed from its list of protocols it can speak18:38
ahasenacksince it can't, fully18:38
mdeslaurwell then firefox and chromium would get tlsv1.3 removed :P18:41
ahasenackthese clients would break if they talked to an apache server out there that didn't come from ubuntu. They might break if they talk to apache from focal, right? In the same way18:41
ahasenackmdeslaur: at least firefox supports pha, I haven't checked if anything changed in the chromium side18:42
ahasenacklast I looked they were waiting for some spec18:42
mdeslaurahasenack: not by default, you have to enable it in settings because it breaks http218:42
ahasenackmdeslaur: ah, that was chromium's wait iirc18:42
mdeslaurclient side certs aren't common enough for them to care about it18:43
mdeslaurand the workaround to disable tlsv1.3 on the server works18:43
ahasenackok, my point is that the same bionic client who fails to do post-handshake-auth in tls1.3 with client certs while talking to the new apache shipped with bionic, will also break when talking to a random web server out there who also offers tls v1.318:44
mdeslauryes18:44
ahasenackbut there was a change in behavior18:45
ahasenack"stuff was working inside my local net; update apache, stuff broke"18:45
rbasakahasenack: back into triage> that's OK - I tagged it server-next, so we can just treat it in our backlog - further triage doesn't really matter then, except to respond to further comments18:48
ahasenackrbasak: what do you think about the bug being on the server and the client? The quick discussion above18:48
rbasakI agree it's a regression18:48
rbasakBut equally sometimes we decide to not fix regressions. When it's complicated. This is complicated :-(18:49
=== jge is now known as ezpeezy
=== ezpeezy is now known as kahuna
=== kahuna is now known as ezpeezy
=== y0sh_ is now known as y0sh
=== y0sh_ is now known as y0sh

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!