X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/1d90cee7c7c9610b302e53364e59a8220794d127..5c30886dbf38689668a47414283f8dc4e895ec7d:/doc/plugins/openid/troubleshooting.mdwn diff --git a/doc/plugins/openid/troubleshooting.mdwn b/doc/plugins/openid/troubleshooting.mdwn index a3637a26f..12cd9bedb 100644 --- a/doc/plugins/openid/troubleshooting.mdwn +++ b/doc/plugins/openid/troubleshooting.mdwn @@ -1,6 +1,6 @@ **TL;DR** -[[!toc levels=3]] +[[!toc levels=4]] # An odyssey through lots of things that have to be right before OpenID works @@ -91,6 +91,32 @@ like mine will blacklist it. >>> so now [ikiwiki.info](/) accepts my OpenID. I'm still not sure it wouldn't be >>> worthwhile to change the useragent default.... -- Chap +#### culprit was an Atomicorp ModSecurity rule + +Further followup: my provider is using [ModSecurity](https://www.modsecurity.org/) +with a ruleset commercially supplied by [Atomicorp](https://www.atomicorp.com/products/modsecurity.html), +which seems to be where this rule came from. They've turned the rule off for _my account_. +I followed up on my ticket with them, suggesting they at least think about turning it off +more systemwide (without waiting for other customers to have bizarre problems that are +hard to troubleshoot), or opening a conversation with Atomicorp about whether such a rule +is really a good idea. Of course, while they were very responsive about turning it off +_for me_, it's much iffier whether they'll take my advice any farther than that. + +So, this may crop up for anybody with a provider that uses Atomicorp ModSecurity rules. + +The ruleset produces a log message saying "turn this rule off if you use libwww-perl", which +just goes to show whoever wrote that message wasn't thinking about what breaks what. It would +have to be "turn this rule off if any of _your_ customers might ever need to use or depend on +an app or service _hosted anywhere else_ that _could_ have been implemented using libwww-perl, +over which you and your customer have no knowledge or control." + +Sigh. -- Chap + +> Thanks for the pointer. It seems the open-source ruleset blacklists libwww-perl by default +> too... this seems very misguided but whatever. I've changed our default User-Agent to +> `ikiwiki/3.20141012` (or whatever the version is). If we get further UA-blacklisting +> problems I'm very tempted to go for `Mozilla/5.0 (but not really)` as the +> next try. --[[smcv]] ## Error: OpenID failure: naive_verify_failed_network: Could not contact ID provider to verify response. @@ -142,6 +168,11 @@ module. > To be clear, these are patches to [[!cpan LWPx::ParanoidAgent]]. > Debian's `liblwpx-paranoidagent-perl (>= 1.10-3)` appears to > have those two patches. --[[smcv]] +> +> Irrelevant to this ikiwiki instance, perhaps relevant to others: +> I've added these patches to [pkgsrc](http://www.pkgsrc.org)'s +> [[!pkgsrc www/p5-LWPx-ParanoidAgent]] and they'll be included in the +> soon-to-be-cut 2014Q3 branch. --[[schmonz]] ## Still naive_verify_failed_network, new improved reason @@ -219,6 +250,8 @@ yet. > Also in Debian's `liblwpx-paranoidagent-perl (>= 1.10-3)`, for the record. > --[[smcv]] +> +> And now in pkgsrc's `www/p5-LWPx-ParanoidAgent`, FWIW. --[[schmonz]] Only that still doesn't end the story, because that hand didn't know what [this hand](https://github.com/noxxi/p5-io-socket-ssl/commit/4f83a3cd85458bd2141f0a9f22f787174d51d587#diff-1) @@ -247,6 +280,13 @@ server name for SNI: > (which is where ikiwiki.info's supporting packages come from). > Please report it upstream too, if the Debian maintainer doesn't > get there first. --[[smcv]] +> +> Applied in pkgsrc. I haven't attempted to conduct before-and-after +> test odysseys, but here's hoping your travails save others some +> time and effort. --[[schmonz]] + +> Reported upstream as [LWPx-ParanoidAgent#14](https://github.com/csirtgadgets/LWPx-ParanoidAgent/issues/14) +> _and_ [IO-Socket-SSL#16](https://github.com/noxxi/p5-io-socket-ssl/issues/16). -- Chap # Success!!