mersenneforum.org  

Go Back   mersenneforum.org > Great Internet Mersenne Prime Search > PrimeNet

Reply
 
Thread Tools
Old 2017-02-10, 21:22   #45
dh1
 
dh1's Avatar
 
"D"
Sep 2015

438 Posts
Default

well, Chrome on Windows likes to opine:

"Obsolete Connection SettingsThe connection to this site uses a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA with P-256), and an obsolete cipher (AES_128_CBC with HMAC-SHA1)."

from what I've read, Google/Chrome would prefer that the HMAC be "better than" SHA-1.

this makes Google/Chrome happy:
"
The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA with P-256), and a strong cipher (AES_128_GCM)."

Last fiddled with by dh1 on 2017-02-10 at 21:45 Reason: more information....
dh1 is offline   Reply With Quote
Old 2017-02-10, 23:20   #46
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

7×11×43 Posts
Default

Quote:
Originally Posted by marigonzes View Post
I am glad to see the move to https. Great job!

I just have one thing to point out. When I access the website over https, my browser says that the website uses an obsolete cipher (AES_128_CBC with HMAC-SHA1). Don't know if this is a problem or not, but I guess it would be nice to take a look.
https://www.ssllabs.com/ssltest/anal...nne.org&latest

"A" rating, I'm happy with it.

Bear in mind, the cipher suites the server supports have to be able to cover some older browsers. I don't know if disabling that particular one would create problems for other browsers, but it's a strong enough set that I'm not losing sleep (and of course, the site didn't have security at all, and it's not being forced to SSL yet anyway) LOL

Last fiddled with by Madpoo on 2017-02-10 at 23:33
Madpoo is offline   Reply With Quote
Old 2017-02-11, 02:21   #47
Mark Rose
 
Mark Rose's Avatar
 
"/X\(‘-‘)/X\"
Jan 2013

B7216 Posts
Default

Quote:
Originally Posted by Madpoo View Post
https://www.ssllabs.com/ssltest/anal...nne.org&latest

"A" rating, I'm happy with it.

Bear in mind, the cipher suites the server supports have to be able to cover some older browsers. I don't know if disabling that particular one would create problems for other browsers, but it's a strong enough set that I'm not losing sleep (and of course, the site didn't have security at all, and it's not being forced to SSL yet anyway) LOL
It probably has to do with the server's preferred list being out of ideal order.
Mark Rose is offline   Reply With Quote
Old 2017-02-13, 04:21   #48
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

1100111011112 Posts
Default

Quote:
Originally Posted by Mark Rose View Post
It probably has to do with the server's preferred list being out of ideal order.
Yeah... that occurred to me too. I may switch it around so the higher bits are preferred. If I do that, Windows needs a reboot for schannel to pick up the new order so I may just change it and then let it fix itself the next time I do maintenance and need to reboot anyway. Not really worth a reboot just for that.

EDIT: Ah... I remember what I did! When I was setting up the cipher list, I deliberately ordered the 128-bit AES ciphers first because I wasn't sure how it would impact server performance when it started encrypting everything. I thought it'd be better to see it at that level before going to 256-bit. So I did change the recommended order when setting that up, on purpose. LOL Funny I forgot about it until I just looked at the list again.

Here's the current order of preference:
Code:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P521
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA

Last fiddled with by Madpoo on 2017-02-13 at 04:31
Madpoo is offline   Reply With Quote
Old 2017-02-13, 06:43   #49
Mark Rose
 
Mark Rose's Avatar
 
"/X\(‘-‘)/X\"
Jan 2013

293010 Posts
Default

It shouldn't make a huge difference.

It's got a Xeon E5420 CPU, correct? It's a shame it doesn't have AES-NI.
Mark Rose is offline   Reply With Quote
Old 2017-02-13, 16:30   #50
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

7×11×43 Posts
Default

Quote:
Originally Posted by Mark Rose View Post
It shouldn't make a huge difference.

It's got a Xeon E5420 CPU, correct? It's a shame it doesn't have AES-NI.
Dual X5550's. I wouldn't be too concerned if it was just a web server but it's more about making sure the SQL side of things isn't disrupted if the web side starts eating more cycles.

I think it'll be just fine so I just need to add the rule to redirect to https and see what happens. I'd prefer to do that maybe over next weekend when I'll have a 3-day weekend to monitor performance and adjust if needed... I may plan for that.
Madpoo is offline   Reply With Quote
Old 2017-02-15, 21:01   #51
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

7·11·43 Posts
Default

I noticed this behavior in Chrome 56 already, but I just got the official notice from Google that they're keeping an eye on our humble little site:

Quote:
To: owner of http://mersenne.org/

Beginning in January 2017, Chrome (version 56 and later) will mark pages that collect passwords or credit card details as “Not Secure” unless the pages are served over HTTPS.
For a year, maybe two, the rumor mill was that Google gives a boost in search results (of some amount or another) to secure sites. I can imagine them getting more aggressive with that over time.

Mersenne.org isn't a huge recipient of links from the search engines, but it does get a good amount, and it's good to see it rank high when people search for prime number related things.

Anyway, all the more reason for SSL.

You may have noticed that in addition to the milestone page, I also redirect to SSL for the "shortcut" exponent reports like www.mersenne.org/M43076291

You'll get sent off to https land for those too.
Madpoo is offline   Reply With Quote
Old 2017-02-19, 06:28   #52
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

7×11×43 Posts
Default SSL is now being forced on

Okay... rule in place now to redirect everything to HTTPS.

With our 3-day weekend (in the US, for Presidents Day) I figured this was a good chance to do it since I'll have time to check for any performance impact or respond to anyone who had some hitherto unknown dependency on non-secure connections.

The old v4 clients that still connect should be unaffected... they connect to "mersenne.org/cgi-bin/whatever" and don't play well with *any* kind of redirection to www and I'm 100% certain they wouldn't work with https at all. I'm amazed there are v4 clients still running, but it's a big, beautiful, wonderful, and utterly bizarre world.
Madpoo is offline   Reply With Quote
Old 2017-02-19, 08:43   #53
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

7×11×43 Posts
Default

Quote:
Originally Posted by Madpoo View Post
Okay... rule in place now to redirect everything to HTTPS.
It's surprisingly squirrely, by the way. The IIS rewrite module does weird things... First off, I have two rules, one to redirect "mersenne.org" to "www.mersenne.org" except if it's from the v4 clients which connect to "mersenne.org/cgi-bin/pnHttp.exe" (yes, a lovely old thing... it's not really cgi exe anymore though, just a PHP in disguise).

Then another rule to take http -> https.

Those were working great, *except* if it was to the root directory. For whatever reason, (.+) does NOT match a path of nothing (although in truth the path is "/".

I ended up changing things around on both rules to do a negative match of cgi-bin/(.+) instead which achieves the same goal and makes that home page redirect as needed.

IIS is weird, in other words. Anyway... I've tested things and it *should* be fine but I wanted to mention it in case anyone saw something being weird. I mean, for goodness sake, other pages were redirecting okay in my testing, but if I went to http://www.mersenne.org/accounts it was redirecting me to the secure home page for some reason. Works now, but like I said... squirrely. Simply doesn't behave in a logical way.

Oh, plus, it's late...might not be at 100%. LOL
Madpoo is offline   Reply With Quote
Old 2017-02-19, 15:57   #54
chalsall
If I May
 
chalsall's Avatar
 
"Chris Halsall"
Sep 2002
Barbados

261316 Posts
Default Some strangeness...

Quote:
Originally Posted by Madpoo View Post
Oh, plus, it's late...might not be at 100%. LOL
Hey Aaron... Something strange is going on...

When you first announced the SSL transition, I configured the GPU72 proxy to change all http requests to https. Worked like a charm.

This morning I noticed that the proxy is seeing "404 Not Found" responses from Primenet. When I cut and paste the https URLs from the logs into a browser, it reports:
Quote:
v5.mersenne.org uses an invalid security certificate. The certificate is only valid for the following names: www.mersenne.org, mersenne.org Error code: SSL_ERROR_BAD_CERT_DOMAIN
If I bypass the warning, it returns 404.

Edit: Forgot to mention... The URLs the proxy sees are of the form "https://v5.mersenne.org/v5server/?v=0.95&px=GIMPS ...". Removing the "http -> https" regex fixes the issue.

Last fiddled with by chalsall on 2017-02-19 at 16:00
chalsall is offline   Reply With Quote
Old 2017-02-19, 17:52   #55
Madpoo
Serpentine Vermin Jar
 
Madpoo's Avatar
 
Jul 2014

7·11·43 Posts
Default

Quote:
Originally Posted by chalsall View Post
Hey Aaron... Something strange is going on...

When you first announced the SSL transition, I configured the GPU72 proxy to change all http requests to https. Worked like a charm.

This morning I noticed that the proxy is seeing "404 Not Found" responses from Primenet. When I cut and paste the https URLs from the logs into a browser, it reports:

If I bypass the warning, it returns 404.

Edit: Forgot to mention... The URLs the proxy sees are of the form "https://v5.mersenne.org/v5server/?v=0.95&px=GIMPS ...". Removing the "http -> https" regex fixes the issue.
Oh... yeah, the API address "v5.mersenne.org" is separate and doesn't have it's own certificate. It's on the same IP address though (host headers) so any HTTPS would have gone to the main website instead of the API.

I'm not sure how that would have worked before though. The only change I made was redirecting http -> https on the website.

Anyway, if you flip the API back to http it'd be fine. I guess at some point I could add a certificate to the API as well, but there's really not as much point in that.

EDIT: I guess I should ask... what URL does the GPU72 proxy hit? If it's hitting something on the main site which is then configured to forward you to the API, it might be keeping it https when really that transition should be back to http for the API hit. I'll dig a bit on my side to try and figure this out as best I can too.

Last fiddled with by Madpoo on 2017-02-19 at 17:58
Madpoo is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
Big milestone coming up schickel Aliquot Sequences 8 2011-07-29 10:54
Mersenne BOINC coming? frmky Software 27 2011-02-20 08:52
Dark times may be coming...? OmbooHankvald mersennewiki 10 2005-10-24 06:26
And the hits just keep on coming..... R.D. Silverman Factoring 13 2005-10-04 10:02
Coming to a DC project near you P4 2.4B/GA8SQ800 /pc3200 dragongoddess Hardware 0 2003-03-22 15:49

All times are UTC. The time now is 08:37.


Tue Jul 27 08:37:18 UTC 2021 up 4 days, 3:06, 0 users, load averages: 1.10, 1.52, 1.66

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.