[ 
https://issues.apache.org/jira/browse/TS-3570?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Susan Hinrichs updated TS-3570:
-------------------------------
    Assignee: Dave Thompson  (was: Leif Hedstrom)

> Need to implement TLS server side Session ID and Session Ticket expiration 
> ---------------------------------------------------------------------------
>
>                 Key: TS-3570
>                 URL: https://issues.apache.org/jira/browse/TS-3570
>             Project: Traffic Server
>          Issue Type: Bug
>          Components: Security, SSL
>            Reporter: Dave Thompson
>            Assignee: Dave Thompson
>
> It appears that ATS does not track session ID/session ticket expiration.  
> This is the responsibility of the TLS server side implementation to not allow 
> resumption of prior negotiated credentials after expiration.    Because 
> time/expiration is not tracked, the upper limit as to how long a bad guy has 
> to compromise prior negotiated keys, may only be limited by cache eviction 
> from heavy traffic flow.   This situation effectively removes various 
> factoring time limits, e.g.  TLS FREAK attacks and others.
> General TLS guidelines (e.g. RFC 5246, Sec F.1.4, and predecessors) suggest 
> upper limits of 24 hours.  NIST has an independent set of guidelines that may 
> be more tailored to cipher suites.   Actual time limit should be out of scope 
> of implementation, and handled by the configuration, however ATS, should 
> honor operator set time limit.     
> First pass would not allow session re-use after time expired of initial 
> negotiations.  Better implementation, would not only not allow, but would 
> zero-out session credentials as soon as expiration time occurs, in stored 
> master/session key.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to