[
https://issues.apache.org/jira/browse/TS-3570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14520176#comment-14520176
]
Dave Thompson commented on TS-3570:
-----------------------------------
Ok, thanks Leif. good to know.
> Need to implement TLS server side Session ID and Session Ticket expiration
> ---------------------------------------------------------------------------
>
> Key: TS-3570
> URL: https://issues.apache.org/jira/browse/TS-3570
> Project: Traffic Server
> Issue Type: Bug
> Components: Security, SSL
> Reporter: Dave Thompson
> Assignee: Dave Thompson
>
> It appears that ATS does not track session ID/session ticket expiration.
> This is the responsibility of the TLS server side implementation to not allow
> resumption of prior negotiated credentials after expiration. Because
> time/expiration is not tracked, the upper limit as to how long a bad guy has
> to compromise prior negotiated keys, may only be limited by cache eviction
> from heavy traffic flow. This situation effectively removes various
> factoring time limits, e.g. TLS FREAK attacks and others.
> General TLS guidelines (e.g. RFC 5246, Sec F.1.4, and predecessors) suggest
> upper limits of 24 hours. NIST has an independent set of guidelines that may
> be more tailored to cipher suites. Actual time limit should be out of scope
> of implementation, and handled by the configuration, however ATS, should
> honor operator set time limit.
> First pass would not allow session re-use after time expired of initial
> negotiations. Better implementation, would not only not allow, but would
> zero-out session credentials as soon as expiration time occurs, in stored
> master/session key.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)