> On Aug 5, 2015, at 8:22 AM, Susan Hinrichs <shinr...@network-geographics.com> 
> wrote:
> 
> I would argue that the specification of the session ticket key in the 
> ssl_multicert.config file is inappropriate at least as the primary mechanism. 
>  It seems that for the common case, you don't need to use different session 
> keys for different domains.  You could specify one key file set in 
> records.config.

Yes, I think this is a promising approach.

>  Then you are not reloading ssl_multicert.config, which I agree for a large 
> file is a somewhat dicey proposition.
> 
> However, there is a setting to allow errors on the ssl_multicert reload 
> (proxy.config.ssl.server.multicert.exit_on_load_fail) so I don't think you 
> are condemned to the SSL failure case you outline.

I don't remember what happens without looking at the code, but ISTR there was a 
time when a reload failure would just log an error preserve the existing 
configuration. Does that still happen?

> There are several bugs open in the ticket area to simply ticket control: 
> TS-3528, TS-3371, TS-3742.  I'm curious if you have a use case where you do 
> need to differentiate ticket keys by domains?
> 
> I would also lobby for a Plugin interface to update the list of tickets.  
> This would allow people to implement any reload strategy they wish.  It would 
> also support people who do not want to store ticket keys through the file 
> system.
> 
> On 8/5/2015 5:10 AM, Bret Palsson wrote:
>> The problem with reloading SSL configuration is if there is a problem with
>> one of your certs, say a permission issue, ATS will unload all the certs
>> from the running process and still accept traffic causing SSL errors.
>> 
>> Being able to reload just the keys is much safer than trying to reload the
>> world, or configs that have changed. Especially since key rotation will
>> likely be automatic on a schedule.
>> 
>> -Bret
>> 
>> On Tue, Aug 4, 2015 at 8:56 PM, James Peach <jpe...@apache.org> wrote:
>> 
>>>> On Aug 4, 2015, at 3:30 PM, Nikhil Marathe <nmara...@linkedin.com.INVALID>
>>> wrote:
>>>> Hi,
>>>> 
>>>> This is Nikhil from Linkedin Engineering.
>>>> 
>>>> A Key Rotation feature has been added to TLS session tickets; details:
>>>> http://comments.gmane.org/gmane.comp.apache.trafficserver.devel/2084
>>>> 
>>>> At present, this feature relies on periodic execution of traffic_line -x
>>> to
>>>> reload new keys. However traffic_line -x reloads entire configuration,
>>> and
>>>> so has a much wider impact than needed.
>>>> 
>>>> In order to address this concern and to localize the impact of reloading
>>>> keys, we would like to propose following approach:
>>>> 
>>>> ATS will schedule periodic continuation which checks the session ticket
>>> key
>>>> file. The reload interval will be records.configurable. If the session
>>>> ticket key file has been modified, ATS will reload the keys from the
>>> file.
>>> 
>>> Hi Nikhil,
>>> 
>>> At the time we discussed the need for this and my view is still that it is
>>> not necessary. Reloading the SSL configuration should be completely
>>> harmless and it seems very straight forward for the job that populates the
>>> new keys to call traffic_line at the right time.
>>> 
>>> cheers,
>>> James
>> 
>> 
>> 
> 

Reply via email to