yeah, the cluster wide ticket reuse is what we need in big site, and here is what we tried: https://cwiki.apache.org/confluence/display/TS/SSLSessionResumption, we planed that maybe a small trick on cluster cache is a quickly solution for that purpose.
FYI > 在 2015年2月5日,上午2:36,Leif Hedstrom <zw...@apache.org> 写道: > >> >> On Feb 4, 2015, at 11:15 AM, Susan Hinrichs >> <shinr...@network-geographics.com> wrote: >> >> As part of integrating in the fix for TS-2480, I'm finally getting my head >> around SSL session tickets and how ATS handles them. >> >> In part of my looking around the web while debugging it seems that there are >> some security concerns with session reuse in general and ticket keys in >> particular. The two major security concerns for ticket keys and PFS were >> * Server deployments don't rotate their ticket keys fast enough >> * Storing sensitive ticket key information on disk gives attackers another >> point of attack >> >> Question 1: Would it be valuable to give people the option in ATS to have >> ATS generate the ticket key information as an alternative to providing the >> ticket key information on the fly. This seems to be the Apache HTTP >> approach. They allow the specification of a file. Otherwise, the server >> will generate a ticket key on process start. This would be a very minimal >> change. I tried it out on my dev build this morning. > > > But that means that if you have 100 boxes behind an SLB VIP, your chance of > getting a ticket session reused is 1% ? That seems weak at best? > >> >> Question 2: Would it be valuable to implement a ticket key lifetime >> parameter? If set and if ATS is generating the ticket keys (see Question >> 1), ATS could regenerate the ticket key once it hit the lifetime. Also >> provide a parameter to specify how long you will allow tickets encrypted >> with the old key, e.g. Set a default of 22 hour key regeneration time with >> a 24 hour use time. >> >> Question 3: Would it be valuable to let plugins hook their own code to run >> during the session_ticket_key_callback? This would allow a deployment to >> override the standard ATS ticket key approach with their own. Potentially >> doing more clever ticket key sharing than just using the file system. Or >> implementing their own key rotation or generation scheme. > > Seems reasonable. > > > I’m somewhat skeptical on the usability in large deployments (e.g. Yahoo), if > the session key is “random” across all boxes in a VIP. And on the flip side, > if there’s a shared seed, then that has the same problem as we have now. How > does HTTPD deal with this? Or they simply don’t ? > > We would have the option of adding something to cluster configuration, to > distribute the session key. But, that’s rarely used, and has some strange > requirements (multicast). With a plugin API, at least someone could implement > some sort of message protocol to share the (newly) generated session keys > with all peers. > > > — Leif - Yongming Zhao 赵永明