[24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd for openSSL 3.0 with PKCS #11 provider
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ubuntu on IBM z Systems |
Opinion
|
High
|
Skipper Bug Screeners | ||
apache2 (Ubuntu) |
Opinion
|
Undecided
|
Andreas Hasenack |
Bug Description
The driver for this is the need to update mod_ssl in Apache2 to support
openssl 3.x providers, since engines are deprecated in openssl 3.x.
This new functionality (openssl provider support) is required for the
use case that one wants to protect the private key of a httpd server
by using a PKCS#11 based (HSM based) private key for the server
instead of using a clear key.
This would subsequently open business opportunity esp. on the s390x platform.
The diff/delta in the 2.5.x/trunk CHANGES file (https:/
"
*) mod_ssl: Support loading certificates and private keys from the
PKCS#11 OpenSSL engine. [Anderson Sasaki <ansasaki redhat.com>,
Joe Orton]
"
In addition the reference to Revision 1914365 seems to be useful reference,
that provides further details:
https:/
Once backports for 2.4.x are available:
- a test build in PPA will be done (and a build log can be provided)
- install and upgrade tests will be done (and an install log can be provided)
The new package should not break any other packages that depend on it,
since there are no changes in the dependencies (or package meta data in general) expected.
A description of a sample setup, incl. all affected components, can be taken from here:
https:/
(The sample is based on RHEL, but except the patches discussed here,
this generally applies to other distributions as well).
'Figure - 1' provides a graphical representation of the overall use case setup.
The above sample setup does incl. test steps;
look for 'Testing' --> 'Test with Apache web server'
(Test uses "httpd -X" and "openssl s_client".)
Once an Ubuntu based Apache 2.4.x test build for noble is available,
and the logs (see above are available)
the 'ubuntu-release' team can finally be subscribed.
__________
Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library.
Accepted for httpd > 2.4.58, see
https:/
tags: | added: architecture-s39064 bugnameltc-204743 severity-high targetmilestone-inin2404 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → linux (Ubuntu) |
information type: | Private → Public |
affects: | linux (Ubuntu) → apache2 (Ubuntu) |
Changed in ubuntu-z-systems: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
Changed in apache2 (Ubuntu): | |
assignee: | Skipper Bug Screeners (skipper-screen-team) → nobody |
Changed in ubuntu-z-systems: | |
importance: | Undecided → High |
Changed in apache2 (Ubuntu): | |
status: | Incomplete → Triaged |
Changed in ubuntu-z-systems: | |
status: | New → Triaged |
tags: | added: server-todo |
description: | updated |
summary: |
- [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd - for openSSL 3.0 with PKCS #11 provider + [FFe] [24.04 FEAT] [SEC2339] HSM protected signing support for Apache + httpd for openSSL 3.0 with PKCS #11 provider |
description: | updated |
tags: | added: noble |
tags: | removed: server-todo |
summary: |
- [FFe] [24.04 FEAT] [SEC2339] HSM protected signing support for Apache - httpd for openSSL 3.0 with PKCS #11 provider + [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd + for openSSL 3.0 with PKCS #11 provider |
description: | updated |
Hi @Ingo - do you already happen to know if there are other changes >.58 that are needed for this to work well?
Furthermore if we'd build a .58+change for Ubuntu noble could you test if that works on s390x as intended or do we go the inferior "compiles -> done" path :-P ?