Activity log for bug #2050017

Date Who What changed Old value New value Message
2024-01-21 22:19:16 bugproxy bug added bug
2024-01-21 22:19:17 bugproxy tags architecture-s39064 bugnameltc-204743 severity-high targetmilestone-inin2404
2024-01-21 22:19:18 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2024-01-21 22:19:19 bugproxy affects ubuntu linux (Ubuntu)
2024-01-21 22:19:20 bugproxy bug added subscriber CDE Administration
2024-01-21 22:19:21 bugproxy bug added subscriber Boris Barth
2024-01-22 11:26:30 Frank Heimes information type Private Public
2024-01-22 11:28:42 Frank Heimes affects linux (Ubuntu) apache2 (Ubuntu)
2024-01-22 11:29:26 Frank Heimes bug task added ubuntu-z-systems
2024-01-22 11:29:39 Frank Heimes ubuntu-z-systems: assignee Skipper Bug Screeners (skipper-screen-team)
2024-01-22 11:29:44 Frank Heimes apache2 (Ubuntu): assignee Skipper Bug Screeners (skipper-screen-team)
2024-01-22 11:29:52 Frank Heimes ubuntu-z-systems: importance Undecided High
2024-01-22 11:36:50 Christian Ehrhardt  apache2 (Ubuntu): status New Incomplete
2024-01-22 11:36:56 Christian Ehrhardt  bug added subscriber Ubuntu Server
2024-01-25 14:17:01 Frank Heimes apache2 (Ubuntu): status Incomplete Triaged
2024-01-25 14:17:04 Frank Heimes ubuntu-z-systems: status New Triaged
2024-02-08 07:42:44 Christian Ehrhardt  tags architecture-s39064 bugnameltc-204743 severity-high targetmilestone-inin2404 architecture-s39064 bugnameltc-204743 server-todo severity-high targetmilestone-inin2404
2024-02-08 14:52:58 Alexandre Erwin Ittner bug added subscriber Alexandre Erwin Ittner
2024-02-21 09:12:21 Frank Heimes description Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library. Accepted for httpd > 2.4.58, see https://svn.apache.org/viewvc?view=revision&revision=1914365 Feature Freeze Exception (FFe): ------------------------------- Since this may take a little longer now and noble's FF is coming up soon, I'm pro-actively transferring this request into a feature freeze exception (FFe). The main reason for this request is a new functionality and the use case that one wants to protect the private key of a httpd server by using a PKCS#11 based (HSM based) private key for the server instead of using a clear key. Which would subsequently open business opportunity esp. on the s390x platform. The diff/delta in the 2.5.x/trunk CHANGES file (https://github.com/apache/httpd/blob/trunk/CHANGES) is: " *) mod_ssl: Support loading certificates and private keys from the PKCS#11 OpenSSL engine. [Anderson Sasaki <ansasaki redhat.com>, Joe Orton] " In addition a reference to Revision 1914365 seems to be useful, that provides further details: https://svn.apache.org/viewvc?view=revision&revision=1914365 Once backports for 2.4.x are available: - a test build in PPA will be done (and a build log can be provided) - install and upgrade tests will be done (and an install log can be provided) The new package should not break any other packages that depend on it, since there are no changes in the dependencies (or package meta data in general) expected. A description of a sample setup, incl. all affected components, can be taken from here: https://www.ibm.com/docs/en/linux-on-z?topic=linuxone-libp11-engine (The sample is based on RHEL, but except the patches discussed here, this generally applies to other distributions as well). 'Figure - 1' provides a graphical representation of the overall use case setup. The above sample setup does incl. test steps; look for 'Testing' --> 'Test with Apache web server' (Test uses "httpd -X" and "openssl s_client".) Once an Ubuntu based Apache 2.4.x test build for noble is available, and the logs (see above are available) the 'ubuntu-release' team can finally be subscribed. __________ Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library. Accepted for httpd > 2.4.58, see https://svn.apache.org/viewvc?view=revision&revision=1914365
2024-02-21 09:12:37 Frank Heimes summary [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd for openSSL 3.0 with PKCS #11 provider [FFe] [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd for openSSL 3.0 with PKCS #11 provider
2024-02-21 16:13:24 Andreas Hasenack apache2 (Ubuntu): assignee Andreas Hasenack (ahasenack)
2024-02-29 07:20:19 Frank Heimes description Feature Freeze Exception (FFe): ------------------------------- Since this may take a little longer now and noble's FF is coming up soon, I'm pro-actively transferring this request into a feature freeze exception (FFe). The main reason for this request is a new functionality and the use case that one wants to protect the private key of a httpd server by using a PKCS#11 based (HSM based) private key for the server instead of using a clear key. Which would subsequently open business opportunity esp. on the s390x platform. The diff/delta in the 2.5.x/trunk CHANGES file (https://github.com/apache/httpd/blob/trunk/CHANGES) is: " *) mod_ssl: Support loading certificates and private keys from the PKCS#11 OpenSSL engine. [Anderson Sasaki <ansasaki redhat.com>, Joe Orton] " In addition a reference to Revision 1914365 seems to be useful, that provides further details: https://svn.apache.org/viewvc?view=revision&revision=1914365 Once backports for 2.4.x are available: - a test build in PPA will be done (and a build log can be provided) - install and upgrade tests will be done (and an install log can be provided) The new package should not break any other packages that depend on it, since there are no changes in the dependencies (or package meta data in general) expected. A description of a sample setup, incl. all affected components, can be taken from here: https://www.ibm.com/docs/en/linux-on-z?topic=linuxone-libp11-engine (The sample is based on RHEL, but except the patches discussed here, this generally applies to other distributions as well). 'Figure - 1' provides a graphical representation of the overall use case setup. The above sample setup does incl. test steps; look for 'Testing' --> 'Test with Apache web server' (Test uses "httpd -X" and "openssl s_client".) Once an Ubuntu based Apache 2.4.x test build for noble is available, and the logs (see above are available) the 'ubuntu-release' team can finally be subscribed. __________ Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library. Accepted for httpd > 2.4.58, see https://svn.apache.org/viewvc?view=revision&revision=1914365 Feature Freeze Exception (FFe): ------------------------------- Since the work on this request may take a little longer and noble's FF is today, this request got transferred into a feature freeze exception (FFe). The driver for this is the need to update mod_ssl in Apache2 to support openssl 3.x providers, since engines are deprecated in openssl 3.x. This new functionality (openssl provider support) is required for the use case that one wants to protect the private key of a httpd server by using a PKCS#11 based (HSM based) private key for the server instead of using a clear key. This would subsequently open business opportunity esp. on the s390x platform. The diff/delta in the 2.5.x/trunk CHANGES file (https://github.com/apache/httpd/blob/trunk/CHANGES) is: "   *) mod_ssl: Support loading certificates and private keys from the      PKCS#11 OpenSSL engine. [Anderson Sasaki <ansasaki redhat.com>,      Joe Orton] " In addition the reference to Revision 1914365 seems to be useful reference, that provides further details: https://svn.apache.org/viewvc?view=revision&revision=1914365 Once backports for 2.4.x are available: - a test build in PPA will be done (and a build log can be provided) - install and upgrade tests will be done (and an install log can be provided) The new package should not break any other packages that depend on it, since there are no changes in the dependencies (or package meta data in general) expected. A description of a sample setup, incl. all affected components, can be taken from here: https://www.ibm.com/docs/en/linux-on-z?topic=linuxone-libp11-engine (The sample is based on RHEL, but except the patches discussed here,  this generally applies to other distributions as well). 'Figure - 1' provides a graphical representation of the overall use case setup. The above sample setup does incl. test steps; look for 'Testing' --> 'Test with Apache web server' (Test uses "httpd -X" and "openssl s_client".) Once an Ubuntu based Apache 2.4.x test build for noble is available, and the logs (see above are available) the 'ubuntu-release' team can finally be subscribed. __________ Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library. Accepted for httpd > 2.4.58, see https://svn.apache.org/viewvc?view=revision&revision=1914365
2024-02-29 07:20:28 Frank Heimes tags architecture-s39064 bugnameltc-204743 server-todo severity-high targetmilestone-inin2404 architecture-s39064 bugnameltc-204743 noble server-todo severity-high targetmilestone-inin2404
2024-03-06 15:22:18 Andreas Hasenack bug added subscriber Andreas Hasenack
2024-03-06 20:54:36 Andreas Hasenack bug watch added https://github.com/latchset/pkcs11-provider/issues/310
2024-03-07 15:59:43 bugproxy bug watch added https://github.com/latchset/pkcs11-provider/issues/355
2024-03-13 15:34:36 Bryce Harrington tags architecture-s39064 bugnameltc-204743 noble server-todo severity-high targetmilestone-inin2404 architecture-s39064 bugnameltc-204743 noble severity-high targetmilestone-inin2404
2024-05-06 07:45:03 Frank Heimes summary [FFe] [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd for openSSL 3.0 with PKCS #11 provider [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd for openSSL 3.0 with PKCS #11 provider
2024-05-06 07:45:24 Frank Heimes description Feature Freeze Exception (FFe): ------------------------------- Since the work on this request may take a little longer and noble's FF is today, this request got transferred into a feature freeze exception (FFe). The driver for this is the need to update mod_ssl in Apache2 to support openssl 3.x providers, since engines are deprecated in openssl 3.x. This new functionality (openssl provider support) is required for the use case that one wants to protect the private key of a httpd server by using a PKCS#11 based (HSM based) private key for the server instead of using a clear key. This would subsequently open business opportunity esp. on the s390x platform. The diff/delta in the 2.5.x/trunk CHANGES file (https://github.com/apache/httpd/blob/trunk/CHANGES) is: "   *) mod_ssl: Support loading certificates and private keys from the      PKCS#11 OpenSSL engine. [Anderson Sasaki <ansasaki redhat.com>,      Joe Orton] " In addition the reference to Revision 1914365 seems to be useful reference, that provides further details: https://svn.apache.org/viewvc?view=revision&revision=1914365 Once backports for 2.4.x are available: - a test build in PPA will be done (and a build log can be provided) - install and upgrade tests will be done (and an install log can be provided) The new package should not break any other packages that depend on it, since there are no changes in the dependencies (or package meta data in general) expected. A description of a sample setup, incl. all affected components, can be taken from here: https://www.ibm.com/docs/en/linux-on-z?topic=linuxone-libp11-engine (The sample is based on RHEL, but except the patches discussed here,  this generally applies to other distributions as well). 'Figure - 1' provides a graphical representation of the overall use case setup. The above sample setup does incl. test steps; look for 'Testing' --> 'Test with Apache web server' (Test uses "httpd -X" and "openssl s_client".) Once an Ubuntu based Apache 2.4.x test build for noble is available, and the logs (see above are available) the 'ubuntu-release' team can finally be subscribed. __________ Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library. Accepted for httpd > 2.4.58, see https://svn.apache.org/viewvc?view=revision&revision=1914365 The driver for this is the need to update mod_ssl in Apache2 to support openssl 3.x providers, since engines are deprecated in openssl 3.x. This new functionality (openssl provider support) is required for the use case that one wants to protect the private key of a httpd server by using a PKCS#11 based (HSM based) private key for the server instead of using a clear key. This would subsequently open business opportunity esp. on the s390x platform. The diff/delta in the 2.5.x/trunk CHANGES file (https://github.com/apache/httpd/blob/trunk/CHANGES) is: "   *) mod_ssl: Support loading certificates and private keys from the      PKCS#11 OpenSSL engine. [Anderson Sasaki <ansasaki redhat.com>,      Joe Orton] " In addition the reference to Revision 1914365 seems to be useful reference, that provides further details: https://svn.apache.org/viewvc?view=revision&revision=1914365 Once backports for 2.4.x are available: - a test build in PPA will be done (and a build log can be provided) - install and upgrade tests will be done (and an install log can be provided) The new package should not break any other packages that depend on it, since there are no changes in the dependencies (or package meta data in general) expected. A description of a sample setup, incl. all affected components, can be taken from here: https://www.ibm.com/docs/en/linux-on-z?topic=linuxone-libp11-engine (The sample is based on RHEL, but except the patches discussed here,  this generally applies to other distributions as well). 'Figure - 1' provides a graphical representation of the overall use case setup. The above sample setup does incl. test steps; look for 'Testing' --> 'Test with Apache web server' (Test uses "httpd -X" and "openssl s_client".) Once an Ubuntu based Apache 2.4.x test build for noble is available, and the logs (see above are available) the 'ubuntu-release' team can finally be subscribed. __________ Enable an E2E use case that allows to configure an Apache webserver to protect its private keys with an HSM that is addressable via an PKCS #11 (signing) provider configured for an openSSL 3.0 library. Accepted for httpd > 2.4.58, see https://svn.apache.org/viewvc?view=revision&revision=1914365
2024-05-17 12:18:44 Frank Heimes ubuntu-z-systems: status Triaged Opinion
2024-05-17 12:18:46 Frank Heimes apache2 (Ubuntu): status Triaged Opinion