./www/hiawatha, Advanced and secure webserver

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 11.6nb9, Package name: hiawatha-11.6nb9, Maintainer: hauke

Hiawatha is an advanced and secure webserver for Unix.

Hiawatha offers protection against SQL injections, Cross-site
Scripting (XSS), Cross-site Request Forgery (CSRF/XSRF) and DoS
attacks.

Hiawatha supports the FastCGI protocol, including load balancing, for
improved CGI performance.

Via Hiawatha's built-in reverse proxy, you can easily integrate other
web solutions or use Hiawatha as an application firewall to protect
other webservers.


Required to run:
[textproc/saxon] [lang/openjdk11]

Required to build:
[pkgtools/cwrappers]

Package options: cache, mbedtls-private, rproxy, urltoolkit, xslt

Master sites:

Filesize: 1800.842 KB

Version history: (Expand)


CVS history: (Expand)


   2025-04-02 00:08:48 by Hauke Fath | Files touched by this commit (3)
Log message:
www/hiawatha: Update enclosed mbedtls to v3.6.3

Mbed-TLS 3.6.3 Release Notes

Default behavior changes

    In TLS clients, if mbedtls_ssl_set_hostname() has not been called,
    mbedtls_ssl_handshake() now fails with
    MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME
    if certificate-based authentication of the server is attempted.
    This is because authenticating a server without knowing what name
    to expect is usually insecure. To restore the old behavior, either
    call mbedtls_ssl_set_hostname() with NULL as the hostname, or
    enable the new compile-time option
    MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME.

Features

    Added new configuration option MBEDTLS_PSA_STATIC_KEY_SLOTS, which
    uses static storage for keys, enabling malloc-less use of key slots.
    The size of each buffer is given by the option
    MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE. By default it accommodates the
    largest PSA key enabled in the build.
    MD module can now perform PSA dispatching also when
    MBEDTLS_PSA_CRYPTO_CLIENT && !MBEDTLS_PSA_CRYPTO_C, even though this
    configuration is not officially supported. This requires that a
    PSA Crypto provider library which:
        supports the required PSA_WANT_ALG_xxx and
        implements psa_can_do_hash() on the client interface
        is linked against Mbed TLS and that psa_crypto_init() is called before
        performing any PSA call.

Security

    Note that TLS clients should generally call mbedtls_ssl_set_hostname()
    if they use certificate authentication (i.e. not pre-shared keys).
    Otherwise, in many scenarios, the server could be impersonated.
    The library will now prevent the handshake and return
    MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME
    if mbedtls_ssl_set_hostname() has not been called.
    Reported by Daniel Stenberg.
    CVE-2025-27809
    Zeroize a temporary heap buffer used in psa_key_derivation_output_key()
    when deriving an ECC key pair.
    Zeroize temporary heap buffers used in PSA operations.
    Fix a vulnerability in the TLS 1.2 handshake. If memory allocation failed
    or there was a cryptographic hardware failure when calculating the
    Finished message, it could be calculated incorrectly. This would break
    the security guarantees of the TLS handshake.
    CVE-2025-27810

Bugfix

    When MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE is disabled, work with
    peers that have middlebox compatibility enabled, as long as no
    problematic middlebox is in the way. Fixes #9551.
    Fix invalid JSON schemas for driver descriptions used by
    generate_driver_wrappers.py.
    Use 'mbedtls_net_close' instead of 'close' in 'mbedtls_net_bind'
    and 'mbedtls_net_connect' to prevent possible double close fd
    problems. Fixes #9711.
    Fix undefined behavior in some cases when mbedtls_psa_raw_to_der() or
    mbedtls_psa_der_to_raw() is called with bits=0.
    Fix compilation on MS-DOS DJGPP. Fixes #9813.
    Fix missing constraints on the AES-NI inline assembly which is used on
    GCC-like compilers when building AES for generic x86_64 targets. This
    may have resulted in incorrect code with some compilers, depending on
    optimizations. Fixes #9819.
    Support re-assembly of fragmented handshake messages in TLS (both
    1.2 and 1.3). The lack of support was causing handshake failures with
    some servers, especially with TLS 1.3 in practice. There are a few
    limitations, notably a fragmented ClientHello is only supported when
    TLS 1.3 support is enabled. See the documentation of
    mbedtls_ssl_handshake() for details.
    Fix definition of MBEDTLS_PRINTF_SIZET to prevent runtime crashes that
    occurred whenever SSL debugging was enabled on a copy of Mbed TLS built
    with Visual Studio 2013 or MinGW.
    Fixes #10017.
    Remove Everest Visual Studio 2010 compatibility headers, which could
    shadow standard CRT headers inttypes.h and stdbool.h with incomplete
    implementatios if placed on the include path, eg. when building Mbed TLS
    with the .sln file shipped with the project.
    Fix issue where psa_key_derivation_input_integer() is not detecting
    bad state after an operation has been aborted.

Changes

    Improve performance of PSA key generation with ECC keys: it no longer
    computes the public key (which was immediately discarded). Fixes #9732.
   2025-02-08 05:11:32 by Takahiro Kambe | Files touched by this commit (1)
Log message:
www/hiawatha: multiple PHP support

Use lang/php/phpversion.mk instead of lang/php/replace.mk.
   2025-01-03 18:40:51 by Hauke Fath | Files touched by this commit (1)
Log message:
Fix a make variable assignment tyop.
   2025-01-03 17:35:32 by Hauke Fath | Files touched by this commit (1)
Log message:
Update upstream URL in publically visible files.
   2025-01-02 22:22:19 by Hauke Fath | Files touched by this commit (5) | Package updated
Log message:
Following upstream's advice, replace the enclosed mbedtls version
3.6.0 with 3.6.2. HIAWATHA_REPLACE_MBEDTLS allows disabling the
update, once upstream has updated the distfile.

We replicate the relevant bits from upstream's update script in the
Makefile and options.mk.

The change restores TLS 1.3 support.
   2024-12-18 17:44:36 by Hauke Fath | Files touched by this commit (2)
Log message:
Solarish are missing RLIMIT_NPROC
   2024-12-01 23:30:06 by Hauke Fath | Files touched by this commit (3) | Package updated
Log message:
TLS v1.3 support is partly broken in mbedtls 3.6, see
<https://github.com/Mbed-TLS/mbedtls/issues/9223>

Since there is no configuration option for limiting the TLS version,
disable 1.3 until upstream updates the enclosed mbedtls.
   2024-11-14 23:22:33 by Thomas Klausner | Files touched by this commit (2429)
Log message:
*: recursive bump for icu 76 shlib major version bump