After an evaluation, GNOME has moved from Bugzilla to GitLab. Learn more about GitLab.
No new issues can be reported in GNOME Bugzilla anymore.
To report an issue in a GNOME project, go to GNOME GitLab.
Do not go to GNOME Gitlab for: Bluefish, Doxygen, GnuCash, GStreamer, java-gnome, LDTP, NetworkManager, Tomboy.
Bug 544234 - Bugzilla should re-enable SSL with a CA-signed SSL certificate
Bugzilla should re-enable SSL with a CA-signed SSL certificate
Status: RESOLVED FIXED
Product: bugzilla.gnome.org
Classification: Infrastructure
Component: general
unspecified
Other All
: Urgent enhancement
: ---
Assigned To: Max Kanat-Alexander
Bugzilla Maintainers
: 326501 592874 593226 (view as bug list)
Depends on:
Blocks:
 
 
Reported: 2008-07-22 20:55 UTC by Allison Karlitskaya (desrt)
Modified: 2009-09-10 12:10 UTC
See Also:
GNOME target: ---
GNOME version: ---



Description Allison Karlitskaya (desrt) 2008-07-22 20:55:13 UTC
https://bugzilla.gnome.org/ currently has a self-signed certificate.  I can think of no reason why it shouldn't be using one signed by CACert.
Comment 1 Christian Kirbach 2008-08-13 13:13:26 UTC
I poked the sysadmins
Comment 2 James Henstridge 2009-01-08 05:21:17 UTC
Given that CAcert failed their audit (they're in the process of replacing their root keys to fix this), it isn't necessarily the best choice here.

StartCom also offers zero cost certificates (http://cert.startcom.org/) and is trusted by Mozilla by default, so seems a better choice.  Even if you don't think their CA inclusion policy is up to snuff, I'd trust a CA that passed more than one that failed.
Comment 3 Allison Karlitskaya (desrt) 2009-01-08 06:47:53 UTC
also worth noting that godaddy, as much as i hate them, offer free certificates for open source projects:

https://www.godaddy.com/gdshop/ssl/ssl_opensource.asp

you can also get $12 ssl certificates from rapidsslonline.com


both are ~100% recognised
Comment 4 Max Kanat-Alexander 2009-08-15 22:21:35 UTC
The new Bugzilla has no SSL certificate at all, so this would be really good.

I suppose we could go with StartCom.
Comment 5 Max Kanat-Alexander 2009-08-21 06:17:49 UTC
*** Bug 326501 has been marked as a duplicate of this bug. ***
Comment 6 Max Kanat-Alexander 2009-08-24 21:08:37 UTC
*** Bug 592874 has been marked as a duplicate of this bug. ***
Comment 7 Frederic Peters 2009-08-26 21:12:18 UTC
*** Bug 593226 has been marked as a duplicate of this bug. ***
Comment 8 Philippe Chaintreuil 2009-09-04 15:19:16 UTC
Ping.

Is anybody making any progress on this?

In the short term: I'd rather have a self-signed cert so SSL encryption happens.
Comment 9 Greg K Nicholson 2009-09-06 17:44:54 UTC
https://bugzilla.gnome.org no longer responds at all, which is a regression. Is this bug to blame?
Comment 10 Matt McCutchen 2009-09-06 19:06:59 UTC
I don't know about blame, but yes, SSL re-enablement following the August Bugzilla upgrade is being tracked here (having been merged in from bug 326501 comment 11, bug 592874, and bug 593226).
Comment 11 Max Kanat-Alexander 2009-09-06 21:48:54 UTC
As far as I know, I am not capable of getting a signed SSL certificate, as I do not control the domain names or email addresses of GNOME. I have no idea who would be capable of doing it--probably somebody on the Infrastructure team.

Once there is a signed cert, I am capable of installing it, no problem. I can also generate a cert and csr for anybody who needs one, for getting the cert signed.
Comment 12 Philippe Chaintreuil 2009-09-07 12:03:14 UTC
Max, could you generate a self-signed cert and install it so HTTPS is possible, if not perfect?

I think a lot of us care more about clear-text passwords than we do about a browser warning.  Then, once someone on Infrastructure (or whomever) gets a cert, it can be replaced.
Comment 13 Max Kanat-Alexander 2009-09-07 21:43:10 UTC
I can't use a self-signed certificate if you want most users to still be able and willing to access bugzilla.gnome.org, and (probably) if you want bug-buddy to keep working.

Here's the problem:

The current version of Bugzilla actually embeds its URL in a lot of places (for security reasons, sometimes). So when you submit the login form, you're always going to go to http even if you load the page via https. The solution to this is to make Bugzilla *enforce* SSL, which changes the URLs to be all https. This redirects every http request in Bugzilla to https, and also prevents the login cookies from being sent over HTTP connections.

However, this means *all* access to Bugzilla will be over SSL. As bugzilla.gnome.org is a very popular Bugzilla, accessed by many less-clueful users, the scary SSL warning in modern browsers will scare them away if we have a self-signed cert. Also, various client applications may not function properly against a self-signed certificate (hard to say since a lot of them are using http now).
Comment 14 Philippe Chaintreuil 2009-09-08 00:51:22 UTC
(In reply to comment #13)
> the scary SSL warning in modern browsers will scare them away if we have
> a self-signed cert.

I understand your logic, and thank you for the clear explination of the issue with a temporary self-signed cert.


I guess the only thing I want to say about that is that I suppose there is a *reason* for all those scary warnings.  Until someone gets a real cert, all those users are at risk of having their simple, reused passwords stolen or falling for phishing schemes.  (And I get more spam to my Gnome Bugzilla e-mail account than any other, so people are harvesting these e-mail addresses.)

Like Max said before, can we get this assigned to someone in Gnome?  Even if it's just someone who's responsible for finding the proper person to obtain a real cert, get the onus on someone to get this fixed or at least passed off to the next person in the chain....  This bug is too big of a security issue to let wallow for over a year!
Comment 15 Max Kanat-Alexander 2009-09-09 12:13:57 UTC
We currently have a StartSSL signed cert and bkor is helping me install it.
Comment 16 Max Kanat-Alexander 2009-09-09 12:36:45 UTC
Okay, Bugzilla now enforces SSL using a StartCom cert (which will be supported even by IE by the end of September or so), except for the bugbuddy interface, which is exempted from the SSL redirect.
Comment 17 Max Kanat-Alexander 2009-09-09 12:39:36 UTC
FWIW, the current SSL cert will expire on September 9, 2010. So we'll need a new one before then. I imagine there's some sort of monitoring or warning system that could be set up for this.
Comment 18 Philippe Chaintreuil 2009-09-09 13:03:30 UTC
Wahoo!  Thanks Max!  You rock!

A big thanks to you and bkor!
Comment 19 Tobias Mueller 2009-09-09 13:24:01 UTC
(In reply to comment #17)
> FWIW, the current SSL cert will expire on September 9, 2010. So we'll need a
> new one before then. I imagine there's some sort of monitoring or warning
> system that could be set up for this.

StartCom sends a reminder at least two weeks and one week before expiry.
Comment 20 Mikel Olasagasti 2009-09-10 12:10:37 UTC
(In reply to comment #17)
> FWIW, the current SSL cert will expire on September 9, 2010. So we'll need a
> new one before then. I imagine there's some sort of monitoring or warning
> system that could be set up for this.

Firefox has a nice addon for that

https://addons.mozilla.org/eu/firefox/addon/8717