Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:99718 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 61000 invoked from network); 3 Jul 2017 17:13:03 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 3 Jul 2017 17:13:03 -0000 Authentication-Results: pb1.pair.com smtp.mail=me@kelunik.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=me@kelunik.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain kelunik.com from 81.169.146.162 cause and error) X-PHP-List-Original-Sender: me@kelunik.com X-Host-Fingerprint: 81.169.146.162 mo4-p00-ob.smtp.rzone.de Received: from [81.169.146.162] ([81.169.146.162:36261] helo=mo4-p00-ob.smtp.rzone.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 52/56-15131-D1B7A595 for ; Mon, 03 Jul 2017 13:13:03 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1499101978; l=5500; s=domk; d=kelunik.com; h=Content-Type:Cc:To:Subject:Date:From:References:In-Reply-To: MIME-Version; bh=GU/sAVxxhG7KJhbc7kD9z2a4zLsZ4RyHDaw94M5IAj4=; b=WPf6wgIWoIdXQwtSEJyBj+Bj0DSVwf6ZxjES5YnFIa+XMiJKa58kz26IX7oqDG9jq9 YAodiGWNoLSeSEfempeeSlf8NWtHNgcgIT7tgSyu9jcuk01yjNiA19k6G1PsRzoz0ls4 y5kuy7m4CXeHOz8vJX2ZFmw4GP+PCSMpZLadI= X-RZG-AUTH: :IWkkfkWkbvHsXQGmRYmUo9mls2vWuiu+7SLDup6E67mzuoNHBqX53Q== X-RZG-CLASS-ID: mo00 Received: by mail-oi0-f41.google.com with SMTP id x187so28146367oig.3 for ; Mon, 03 Jul 2017 10:12:58 -0700 (PDT) X-Gm-Message-State: AIVw111n7TZ5oDA3cfwy0brNW6KT3SQXjBgXzgDISXOS53Jb7UwGbBps Gzek/VwJb23V3CqG3Rcq6FHPTp2g7Q== X-Received: by 10.202.53.195 with SMTP id c186mr3221680oia.46.1499101977967; Mon, 03 Jul 2017 10:12:57 -0700 (PDT) MIME-Version: 1.0 Received: by 10.74.81.135 with HTTP; Mon, 3 Jul 2017 10:12:57 -0700 (PDT) In-Reply-To: References: Date: Mon, 3 Jul 2017 19:12:57 +0200 X-Gmail-Original-Message-ID: Message-ID: To: Anatol Belski , Sara Golemon Cc: Jakub Zelenka , PHP Internals Content-Type: multipart/alternative; boundary="001a113cf57ce1077305536ce0cd" Subject: Re: [PHP-DEV] Re: [RFC] Distrust SHA-1 Certificates From: me@kelunik.com (Niklas Keller) --001a113cf57ce1077305536ce0cd Content-Type: text/plain; charset="UTF-8" > > I haven't followed the discussion back then, but just read through. The > discussion seems unfinished yet, as far as I understood. The two > approaches - the one going by security levels, and the other using > strength bits as a argument. As for me, security levels were more future > oriented and the original alike, while have to be emulated with older > dependencies. On the other hand - giving the strength directly is a an > explicit approach, even if it's completely different from the latest > OpenSSL. It were good to hear from Jakub yet. > > About how to proceed - I'd say the issue is clear and either way should be > fixed. The RFC chooses the explicit strength approach. What I'm a bit > concerned about is, that there's no implementation by this time, neither > for 7.2 nor for lower. Given there are indeed just last moments before the > feature freeze, for 7.2 it depends on RMs. > This is caused by the approach not being clear, I have an implementation without options locally. > In general, I'd prefer to see the discussion to come more or less to the > conclusion about pro/contra of the concrete approach, especially from the > POV different OpenSSL versions and future support. If a patch with an > implementation could make it into 7.2, the backport for lower branches will > have no choice regarding approach. But, without being able to look at th > patch, it is hard to say, whether a backport is even doable. For example, > how it often could be, an implementation of a new stream context option > might require some additional struct member, etc. Alternatively, what could > be done - bring the approach discussion and consequently the BC > implementation in all of 7\.[012] while letting the restrictive part to > target 7.3. Either way, please let's see the code. > I think the best approach for now would be that: Add two new context options for the "ssl" wrapper: "insecure_allow_md5_signature" and "insecure_allow_sha1_signature". They will both default to false starting in PHP 7.2 while the backports to PHP 7.1 and 7.0 will default to true. Additionally there will be two INI options which are only added to PHP 7.1 and 7.0 to allow people to immediately upgrade to secure defaults without any risk of breaking other apps. Regards, Niklas --001a113cf57ce1077305536ce0cd--