вт, 10 мар. 2020 г. в 05:37, Lukas Tribus <[email protected]>:

> Hello,
>
>
> On Mon, 9 Mar 2020 at 20:39, Илья Шипицин <[email protected]> wrote:
> >> I would disable session tickets by default in haproxy. Given that most
> >> clients support TLS 1.3 already this change would not even slow down
> many
> >> clients.
> >
> >
> > TLS tickets really require more love :)
> >
> > actually, there are two bad choices here
> >
> > 1) to specify TLS ticket key
> > 2) not to specify
> >
> > if you specify, your security team will tell you that "it is not secure".
> > if you do not specify, keys are generated on startup and it lead to huge
> CPU spike on app reload (if you apply new config, app is reloaded and keys
> are generated from scratch)
>
> You rotate ticket keys with "tls-ticket-keys" and reload or you can
> even add new ticket keys online via the "set ssl tls-key" unix socket
> command. But you have to take care of it if you want ticket key
> rotation.
>

it is clear for educated people.
but documentation is written for non educated, right :) ?



>
> A performant, scalable and fully secure TLS setup is a non-trivial
> configuration to make. Probably not possible without compromises in a
> production environment with real world clients, but that is just how
> it is. Regarding security aspects the actual attack surface has to be
> considered. This attack requires the intruder to read the TLS ticket
> key from memory, this kills the concept of Forward Secrecy, but it
> does not kill anything else (that would not already be compromised
> anyway when an attacker can read from memory).
>
>
> Lukas
>

Reply via email to