Dave Thompson created TS-3570:
---------------------------------

             Summary: Need to implement TLS server side Session ID and Session 
Ticket expiration 
                 Key: TS-3570
                 URL: https://issues.apache.org/jira/browse/TS-3570
             Project: Traffic Server
          Issue Type: Bug
          Components: Security, SSL
            Reporter: Dave Thompson
            Assignee: Leif Hedstrom


It appears that ATS does not track session ID/session ticket expiration.  This 
is the responsibility of the TLS server side implementation to not allow 
resumption of prior negotiated credentials after expiration.    Because 
time/expiration is not tracked, the upper limit as to how long a bad guy has to 
compromise prior negotiated keys, may only be limited by cache eviction from 
heavy traffic flow.   This situation effectively removes various factoring time 
limits, e.g.  TLS FREAK attacks and others.

General TLS guidelines (e.g. RFC 5246, Sec F.1.4, and predecessors) suggest 
upper limits of 24 hours.  NIST has an independent set of guidelines that may 
be more tailored to cipher suites.   Actual time limit should be out of scope 
of implementation, and handled by the configuration, however ATS, should honor 
operator set time limit.     

First pass would not allow session re-use after time expired of initial 
negotiations.  Better implementation, would not only not allow, but would 
zero-out session credentials as soon as expiration time occurs, in stored 
master/session key.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to