В репозиторий добавлен Apache httpd 2.4.39 с поддержкой сжатия brotli от Google, http2 для Red Hat Enterprise Linux и CentOS. Mod_ssl собран статически с OpenSSL 1.1.1c. Ссылки:
Заметим, что httpd 2.4.39 уже поддерживает TLS 1.3 при сборке с OpenSSL 1.1.1. Все новые шифры включены и работают.
TLS 1.3 final на сегодня работает в Google Chrome 70+ и Mozilla Firefox 63+.
Для работы с SELinux установите следующий boolean:
setsebool -P httpd_execmem=1
Модуль brotli уже включён в базовый RPM. Всё, что нужно — настроить фильтр
AddOutputFilterByType BROTLI_COMPRESS text/html text/plain text/xml text/css text/javascript application/javascript
Changes with Apache 2.4.39:
- mod_proxy/ssl: Cleanup per-request SSL configuration anytime a backend connection is recycled/reused to avoid a possible crash with some SSLProxy configurations in
or context. PR 63256. [Yann Ylavic] - mod_ssl: Correctly restore SSL verify state after TLSv1.3 PHA failure. [Michael Kaufmann]
- mod_log_config: Support %{c}h for conn-hostname, %h for useragent_host PR 55348
- mod_socache_redis: Support for Redis as socache storage provider.
- core: new configuration option ‘MergeSlashes on|off’ that controls handling of multiple, consecutive slash (‘/’) characters in the path component of the request URL. [Eric Covener]
- mod_http2: when SSL renegotiation is inhibited and a 403 ErrorDocument is in play, the proper HTTP/2 stream reset did not trigger with H2_ERR_HTTP_1_ 1_REQUIRED. Fixed. [Michael Kaufmann]
- mod_http2: new configuration directive: `H2Padding numbits` to control padding of HTTP/2 payload frames. ‘numbits’ is a number from 0-8, controlling the range of padding bytes added to a frame. The actual number added is chosen randomly per frame. This applies to HEADERS, DATA and PUSH_PROMISE frames equally. The default continues to be 0, e.g. no padding. [Stefan Eissing]
- mod_http2: ripping out all the h2_req_engine internal features now that mod _proxy_http2 has no more need for it. Optional functions are still declared but no longer implemented. While previous mod_proxy_http2 will work with this, it is recommended to run the matching versions of both modules. [Stefan Eissing]
- mod_proxy_http2: changed mod_proxy_http2 implementation and fixed several bugs which resolve PR63170. The proxy module does now a single h2 request on the (reused) connection and returns. [Stefan Eissing]
- mod_http2/mod_proxy_http2: proxy_http2 checks correct master connection aborted status to trigger immediate shutdown of backend connections. This is now always signalled by mod_http2 when the the session is being released. proxy_http2 now only sends a PING frame to the backend when there is not already one in flight. [Stefan Eissing]
- mod_proxy_http2: fixed an issue where a proxy_http2 handler entered an infi nite loop when encountering certain errors on the backend connection. [Stefan Eissing]
- mod_http2: Configuration directives H2Push and H2Upgrade can now be specifi ed per Location/Directory, e.g. disabling PUSH for a specific set of resources. [Stefan Eissing]
- mod_http2: HEAD requests to some module such as mod_cgid caused the stream to terminate improperly and cause a HTTP/2 PROTOCOL_ERROR. [Michael Kaufmann]
- http: Fix possible empty response with mod_ratelimit for HEAD requests. PR 63192. [Yann Ylavic]
- mod_cache_socache: Avoid reallocations and be safe with outgoing data lifetime. [Yann Ylavic]
- MPMs unix: bind the bucket number of each child to its slot number, for a more efficient per bucket maintenance. [Yann Ylavic]
- mod_auth_digest: Fix a race condition. Authentication with valid credentials could be refused in case of concurrent accesses from different users. PR 63124. [Simon Kappel]
- mod_http2: enable re-use of slave connections again. Fixed slave connection keepalives counter. [Stefan Eissing]
- mod_reqtimeout: Allow to configure (TLS-)handshake timeouts. PR 61310. [Yann Ylavic]
-
mod_proxy_wstunnel: Fix websocket proxy over UDS. PR 62932
- mod_ssl: Don’t unset FIPS mode on restart unless it’s forced by configuration (SSLFIPS on) and not active by default in OpenSSL. PR 63136. [Yann Ylavic]
I have CentOS with CodeIT repo apache setup, when trying to insta mod_ssl I get this error?
Error: Package: 1:mod_ssl-2.4.39-2.codeit.el7.x86_64 (CodeIT)
Requires: httpd = 2.4.39-2.codeit.el7
Installed: httpd-2.4.33-3.codeit.el7.x86_64 (@CodeIT)
httpd = 2.4.33-3.codeit.el7
when I run yum update httpd is says its already up to date? I need to run mod_ssl for certbot.
TLS_FALLBACK_SCSV not supported. is tested with this test from Remi.
https://ssldecoder.org/
howto?
While :
1 warning!
TLS_FALLBACK_SCSV unsupported. Please upgrade OpenSSL to enable. This offers downgrade attack protection.
Thanks for doing such great job!
Sorry REMY with Y
version : «This Server’s OpenSSL Version OpenSSL 1.1.1 11 Sep 2018 (Library: OpenSSL 1.1.1c 28 May 2019) »
For cipherlist info here https://cipherli.st/
Please take a look at fixes https://www.kb.cert.org/vuls/id/605641/
succes
Hello John, we only build and release official versions with selected Fedora patches.
We do not apply patches for unreleased versions. Please wait for official version of mod_h[ttp]2 with patched problems.
Thanks for this fix here.
https://codeit.guru/en_US/2019/08/apache-httpd-2-4-41-tls-1-3-brotli-alpn-http2-openssl-1-1-1c-red-hat-centos-rhel-7/
Hello and thanks for the compilation here.
I would like to build the packages from the src.rpm myself and have a few questions about it:
— are certain options used when building openssl or is it just a simple «./config && make»?
— apr-util needs mariadb-connector-c-devel for building — is it possible to use the package from CentOS 8?
Thanks!
Hello,
— ./config no-shared && make
— I am not sure about this, we have rebuilt source rpms from Fedora without modifications.