On Mon, Mar 09, 2020 at 07:18:23PM +0100, Björn Jacke wrote:
> On 2020-03-09 at 17:44 +0100 Lukas Tribus sent off:
> > Perhaps we can relax the wording a bit here and describe the actual
> > technical issue along with some recommendations. Apache for example
> > documents [1]:
> 
> I think the wording from the patch is still quite relaxed :). One of the best
> summaries describing the session ticket flaws, which I recommend is this:
> https://blog.filippo.io/we-need-to-talk-about-session-tickets/

So as explained in the article above, all of this is only a problem if keys
are *never* rotated. New keys are used every time the process is reloaded,
and those using distributed deployments update them via the "set ssl tls-key"
command on the CLI which purposely supports old and new key in order to
maintain a distributed state synchronized yet up to date.

> I would disable session tickets by default in haproxy. Given that most
> clients support TLS 1.3 already this change would not even slow down many
> clients.

The problem is not as much the client slowing down as killing the servers
by the excess of handshakes caused by the minority of remaining clients,
because with this the service easily becomes totally unavailable for
everyone depending on the population of clients. Not everyone has a lot
of up-to-date browsers in their clients, and a number of deployments
actually never see a browser at all.

Willy

Reply via email to