<feed xmlns='http://www.w3.org/2005/Atom'>
<title>leap_platform.git/puppet/modules/site_apache/files, branch develop</title>
<subtitle>[leap_platform] 
</subtitle>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/'/>
<entry>
<title>added support for Let's Encrypt</title>
<updated>2016-09-01T17:49:22+00:00</updated>
<author>
<name>elijah</name>
<email>elijah@riseup.net</email>
</author>
<published>2016-08-31T21:54:46+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=8116e007cfd4dbee8282247348cf45473dcde45e'/>
<id>8116e007cfd4dbee8282247348cf45473dcde45e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Disable the Trace method (#8195)</title>
<updated>2016-06-16T18:55:22+00:00</updated>
<author>
<name>Micah</name>
<email>micah@leap.se</email>
</author>
<published>2016-06-16T16:24:01+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=293cdaee6db4a4d0b13a56fcd047819d60f38ce2'/>
<id>293cdaee6db4a4d0b13a56fcd047819d60f38ce2</id>
<content type='text'>
The Trace method is enabled because of the Apache module, but it is not the
default in Debian, and it should not be enabled, for more information see the
following:

https://www.kb.cert.org/vuls/id/867593

Change-Id: I06a06ae679dbf7049f26a017125b61e5e38f6268
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The Trace method is enabled because of the Apache module, but it is not the
default in Debian, and it should not be enabled, for more information see the
following:

https://www.kb.cert.org/vuls/id/867593

Change-Id: I06a06ae679dbf7049f26a017125b61e5e38f6268
</pre>
</div>
</content>
</entry>
<entry>
<title>Implement weakdh recommendations for cipher suites (#7024)</title>
<updated>2015-05-27T02:23:22+00:00</updated>
<author>
<name>Micah Anderson</name>
<email>micah@leap.se</email>
</author>
<published>2015-05-27T02:23:22+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=b77e3f7e87bc64ffaaa608e5b6a6ef385b8054d3'/>
<id>b77e3f7e87bc64ffaaa608e5b6a6ef385b8054d3</id>
<content type='text'>
This is a first step mitigation until we can have a newer apache that
will allow us to specify dh parameters other than the default.

Change-Id: Ibfcee53b331e8919466027dde1a93117b5210d9d
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is a first step mitigation until we can have a newer apache that
will allow us to specify dh parameters other than the default.

Change-Id: Ibfcee53b331e8919466027dde1a93117b5210d9d
</pre>
</div>
</content>
</entry>
<entry>
<title>Adds a ssl_common.inc file to use inside vhosts for the SSL config (solves #5103)</title>
<updated>2014-12-22T13:52:38+00:00</updated>
<author>
<name>guido</name>
<email>guido@bruo.org</email>
</author>
<published>2014-12-22T13:52:38+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=7d1f286e571af299fa88881393876dc6fb494256'/>
<id>7d1f286e571af299fa88881393876dc6fb494256</id>
<content type='text'>
Change-Id: I717bf7ca2c5679165a99370c4540f8b8dc1a48ea
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Change-Id: I717bf7ca2c5679165a99370c4540f8b8dc1a48ea
</pre>
</div>
</content>
</entry>
<entry>
<title>Set apache header X-Frame-Options: "DENY"</title>
<updated>2013-08-21T16:26:24+00:00</updated>
<author>
<name>Micah Anderson</name>
<email>micah@leap.se</email>
</author>
<published>2013-08-21T00:53:58+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=538fe40239c59c186099fa7e1a026969fba4ae36'/>
<id>538fe40239c59c186099fa7e1a026969fba4ae36</id>
<content type='text'>
The LEAP web application can be displayed inside other pages using an HTML
iframe.  Therefore, an attacker can embed parts of the LEAP application inside
of a webpage they control. They can then use special style properties to
disguise the embedded page. By tricking a user in to clicking in the iframe, the
attacker can coerce the user in to performing unintended actions within the LEAP
web application.

An attacker creates a website that embeds the LEAP web application in an iframe.
They then create an HTML /JavaScript game on the same page that involves
clicking and dragging sprites. When a user plays the game, they are in fact
dragging new text values in to the ‘‘Change Password’’ form in the LEAP web app,
which is hidden behind the game using

As long as iframe embedding is not required in the normal usage of the
application, the X-Frame-Options header should be added to prevent browsers from
displaying the web application in frames on other origins.

This has also been set in the webapp

Change-Id: I9e26ae32de4b7b6a327196838d0fa410648f107d
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The LEAP web application can be displayed inside other pages using an HTML
iframe.  Therefore, an attacker can embed parts of the LEAP application inside
of a webpage they control. They can then use special style properties to
disguise the embedded page. By tricking a user in to clicking in the iframe, the
attacker can coerce the user in to performing unintended actions within the LEAP
web application.

An attacker creates a website that embeds the LEAP web application in an iframe.
They then create an HTML /JavaScript game on the same page that involves
clicking and dragging sprites. When a user plays the game, they are in fact
dragging new text values in to the ‘‘Change Password’’ form in the LEAP web app,
which is hidden behind the game using

As long as iframe embedding is not required in the normal usage of the
application, the X-Frame-Options header should be added to prevent browsers from
displaying the web application in frames on other origins.

This has also been set in the webapp

Change-Id: I9e26ae32de4b7b6a327196838d0fa410648f107d
</pre>
</div>
</content>
</entry>
<entry>
<title>Disable verbose, identifying apache headers (#3462):</title>
<updated>2013-08-21T16:24:39+00:00</updated>
<author>
<name>Micah Anderson</name>
<email>micah@leap.se</email>
</author>
<published>2013-08-21T00:36:12+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=e3a1c5d0c8f644bc0956758a8832d2f586556cf6'/>
<id>e3a1c5d0c8f644bc0956758a8832d2f586556cf6</id>
<content type='text'>
 . Disable ServerSignature
 . Set ServerTokens Prod
 . unset the X-Powered-By and X-Runtime apache headers

Change-Id: Iddb2cb9a0465bc7f657581adaacbbf748479fd7a
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
 . Disable ServerSignature
 . Set ServerTokens Prod
 . unset the X-Powered-By and X-Runtime apache headers

Change-Id: Iddb2cb9a0465bc7f657581adaacbbf748479fd7a
</pre>
</div>
</content>
</entry>
<entry>
<title>remove apache ssl proxy in preparation of replacing it with a stunnel setup</title>
<updated>2013-03-14T22:40:19+00:00</updated>
<author>
<name>Micah Anderson</name>
<email>micah@riseup.net</email>
</author>
<published>2013-03-14T17:58:06+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=d4b45da9a521a6faf17f9ba7742bcee897a503cc'/>
<id>d4b45da9a521a6faf17f9ba7742bcee897a503cc</id>
<content type='text'>
This presents us with an interesting problem of deprecation. We need to manage
the removal of something that we previously installed in any released code. How
long we carry the puppet code that removes raises some interesting questions: do
we require that someone who deployed version 1 (where the apache ssl proxy was
deployed) of the platform upgrade first to version 2 (where we remove the apache
ssl proxy) before they upgrade to version 3 (where the apache ssl proxy removal
is no longer present) -- or do we allow people to skip versions?
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This presents us with an interesting problem of deprecation. We need to manage
the removal of something that we previously installed in any released code. How
long we carry the puppet code that removes raises some interesting questions: do
we require that someone who deployed version 1 (where the apache ssl proxy was
deployed) of the platform upgrade first to version 2 (where we remove the apache
ssl proxy) before they upgrade to version 3 (where the apache ssl proxy removal
is no longer present) -- or do we allow people to skip versions?
</pre>
</div>
</content>
</entry>
<entry>
<title>couchdb: use x509 module to deploy certs (fixes #1063)</title>
<updated>2012-12-10T22:36:48+00:00</updated>
<author>
<name>varac</name>
<email>varacanero@zeromail.org</email>
</author>
<published>2012-12-10T22:36:48+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=3f0bbccb1b0020530ae4e4a0682fbf9f5f401e3b'/>
<id>3f0bbccb1b0020530ae4e4a0682fbf9f5f401e3b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>configure apache ssl proxy for couchdb</title>
<updated>2012-11-03T10:33:38+00:00</updated>
<author>
<name>varac</name>
<email>varacanero@zeromail.org</email>
</author>
<published>2012-11-03T10:33:38+00:00</published>
<link rel='alternate' type='text/html' href='https://leap.se/git/leap_platform.git/commit/?id=5493d362f7b3abd6c8aa9350341a551c53622604'/>
<id>5493d362f7b3abd6c8aa9350341a551c53622604</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
