Changeset 8d0efdc in mod_gnutls
- Timestamp:
- Jun 18, 2020, 4:57:32 PM (3 years ago)
- Branches:
- asyncio, main, master
- Children:
- 9a26df9
- Parents:
- 8f000b7
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/mod_gnutls_manual.md
r8f000b7 r8d0efdc 134 134 : Turns off all caching of TLS sessions. 135 135 136 This can significantly reduce the performance of `mod_gnutls`137 since even followup connections by a client must renegotiate138 parameters instead of reusing old ones. This is the default, since139 it requires noconfiguration.136 This can reduce the performance of `mod_gnutls` since every 137 followup connection by a client must perform a full TLS 138 handshake. This is the default because it requires no 139 configuration. 140 140 141 141 Session tickets are an alternative to using a session cache, … … 161 161 GnuTLSSessionTickets [on|off] 162 162 163 Default: `o n` with GnuTLS 3.6.4 and newer, `off` otherwise\163 Default: `off` 164 164 Context: server config, virtual host 165 165 … … 174 174 without a `GnuTLSSessionTickets` setting will use the global setting. 175 175 176 *Warning:* With GnuTLS version before 3.6.4 the master key that177 protects the tickets is generated only on server start, and there is 178 no mechanism to roll over the key. If session tickets are enabled it 179 is highly recommended to restart the server regularly to protect past 180 sessions in case an attacker gains access to server memory. GnuTLS181 3.6.4 introduced an automatic TOTP-based key rollover, so this warning 182 d oes not apply any more and tickets are enabled by default.176 *Warning:* The primary key used to encrypt the tickets is generated 177 while the server loads its configuration. An attacker who is able to 178 read this key from server RAM may be able to decrypt past TLS 1.2 179 sessions and impersonate the server to clients trying to resume 180 sessions using tickets. If you enable session tickets you should 181 regularly `reload` the server to generate fresh keys. Many 182 distributions automatically do this during log rotation. 183 183 184 184 ### GnuTLSDHFile … … 801 801 issuer certificate in addition to the server's, and 802 802 [mod\_socache\_shmcb](http://httpd.apache.org/docs/current/en/mod/mod_socache_shmcb.html) 803 is loaded. With Gnutls 3.6.4 or newer session tickets are enabled, 804 too. 803 is loaded. 805 804 806 805 Virtual Hosts with Server Name Indication -
src/gnutls_hooks.c
r8f000b7 r8d0efdc 659 659 sc->enabled = GNUTLS_ENABLED_FALSE; 660 660 if (sc->tickets == GNUTLS_ENABLED_UNSET) 661 { 662 /* GnuTLS 3.6.4 introduced automatic master key rotation */ 663 if (gnutls_check_version_numeric(3, 6, 4)) 664 sc->tickets = GNUTLS_ENABLED_TRUE; 665 else 666 sc->tickets = GNUTLS_ENABLED_FALSE; 667 } 661 sc->tickets = GNUTLS_ENABLED_FALSE; 668 662 if (sc->export_certificates_size < 0) 669 663 sc->export_certificates_size = 0; -
test/tests/37_TLS_reverse_proxy_resume_session/backend.conf
r8f000b7 r8d0efdc 1 1 Include ${PWD}/proxy_backend.conf 2 GnuTLSSessionTickets on 2 3 3 4 <VirtualHost _default_:${BACKEND_PORT}>
Note: See TracChangeset
for help on using the changeset viewer.