Uploaded image for project: 'Traffic Server'
  1. Traffic Server
  2. TS-2372

Add forward secrecy support (SSL related)

    Details

    • Type: New Feature
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: None
    • Fix Version/s: 4.2.0
    • Component/s: HTTP, Security, SSL
    • Labels:
      None

      Issue Links

        Activity

        Show
        jamespeach James Peach added a comment - http://en.wikibooks.org/wiki/OpenSSL/Diffie-Hellman_parameters
        Hide
        jamespeach James Peach added a comment -

        OK, looks like there's 2 things we need to do here:

        1. Set support for setting Diffie-Hellman parameters on the SSL context
        2. Set up the ECDH support.

        Show
        jamespeach James Peach added a comment - OK, looks like there's 2 things we need to do here: 1. Set support for setting Diffie-Hellman parameters on the SSL context 2. Set up the ECDH support.
        Hide
        jamespeach James Peach added a comment -

        I have a patch to ECDHE support. I'm not planning to add DH support for other key types unless someone specifically needs it. ECDHE seems to be shaping up as the preferred forward security mechanism.

        Show
        jamespeach James Peach added a comment - I have a patch to ECDHE support. I'm not planning to add DH support for other key types unless someone specifically needs it. ECDHE seems to be shaping up as the preferred forward security mechanism.
        Hide
        janfrode Jan-Frode Myklebust added a comment -

        Adam Langley has an argument for supporting DHE in addition to ECDHE, ref: https://www.imperialviolet.org/2013/10/07/chacha20.html

        "... As a last attempt, they'll try an SSLv3 connection with no extensions.

        Several useful features get jettisoned when this occurs but the important one for security, up until now, has been that elliptic curve support is disabled in SSLv3. For servers that support ECDHE but not DHE that means that a network attacker can trigger version downgrades and remove forward security from a connection."

        Show
        janfrode Jan-Frode Myklebust added a comment - Adam Langley has an argument for supporting DHE in addition to ECDHE, ref: https://www.imperialviolet.org/2013/10/07/chacha20.html "... As a last attempt, they'll try an SSLv3 connection with no extensions. Several useful features get jettisoned when this occurs but the important one for security, up until now, has been that elliptic curve support is disabled in SSLv3. For servers that support ECDHE but not DHE that means that a network attacker can trigger version downgrades and remove forward security from a connection."
        Hide
        jamespeach James Peach added a comment -

        Why would Chrome ever downgrade to SSLv3 when connecting to an Apache Traffic Server that is using OpenSSL? OpenSSL has supported TLS >= 1.0 for a long time. We probably should update our defaults to turn SSLv3 off.

        Show
        jamespeach James Peach added a comment - Why would Chrome ever downgrade to SSLv3 when connecting to an Apache Traffic Server that is using OpenSSL? OpenSSL has supported TLS >= 1.0 for a long time. We probably should update our defaults to turn SSLv3 off.
        Hide
        i.galic Igor Galić added a comment -

        +1 on disabling SSLv3.

        Btw, try doing that in your browser, while also enabling HTTPS Everywhere plugin and see how far you get.

        Show
        i.galic Igor Galić added a comment - +1 on disabling SSLv3. Btw, try doing that in your browser, while also enabling HTTPS Everywhere plugin and see how far you get.
        Hide
        janfrode Jan-Frode Myklebust added a comment -

        Disabling SSLv3 breaks IE6, which is still used by almost 5% of the desktop clients according to http://marketshare.hitslink.com/browser-market-share.aspx?qprid=2&qpcustomd=0

        Show
        janfrode Jan-Frode Myklebust added a comment - Disabling SSLv3 breaks IE6, which is still used by almost 5% of the desktop clients according to http://marketshare.hitslink.com/browser-market-share.aspx?qprid=2&qpcustomd=0
        Hide
        jamespeach James Peach added a comment -

        OK, sounds like there could be some value in supporting DHE for non-EC key types. Let's spin that out into a separate ticket and see whether we can get a contributor for it.

        Show
        jamespeach James Peach added a comment - OK, sounds like there could be some value in supporting DHE for non-EC key types. Let's spin that out into a separate ticket and see whether we can get a contributor for it.
        Hide
        jira-bot ASF subversion and git services added a comment -

        Commit d7bb4cd3c6ec6c1fc5e70251257e2e10e450c92f in branch refs/heads/master from James Peach
        [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=d7bb4cd ]

        TS-2372: update default SSL context options

        Show
        jira-bot ASF subversion and git services added a comment - Commit d7bb4cd3c6ec6c1fc5e70251257e2e10e450c92f in branch refs/heads/master from James Peach [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=d7bb4cd ] TS-2372 : update default SSL context options
        Hide
        jira-bot ASF subversion and git services added a comment -

        Commit d75e933a1c1b05700ca79dcbe53f6261d39e8c13 in branch refs/heads/master from James Peach
        [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=d75e933 ]

        TS-2372: enable ECDHE forward security

        Show
        jira-bot ASF subversion and git services added a comment - Commit d75e933a1c1b05700ca79dcbe53f6261d39e8c13 in branch refs/heads/master from James Peach [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=d75e933 ] TS-2372 : enable ECDHE forward security
        Hide
        jamespeach James Peach added a comment -

        See TS-2417 for forward secrecy for other key types.

        Show
        jamespeach James Peach added a comment - See TS-2417 for forward secrecy for other key types.
        Hide
        jira-bot ASF subversion and git services added a comment -

        Commit 9f69f05f2a44c716e5e949c36085877731f93423 in branch refs/heads/master from Leif Hedstrom
        [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=9f69f05 ]

        TS-2372 Fix typo in npnEndpoint

        Show
        jira-bot ASF subversion and git services added a comment - Commit 9f69f05f2a44c716e5e949c36085877731f93423 in branch refs/heads/master from Leif Hedstrom [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=9f69f05 ] TS-2372 Fix typo in npnEndpoint
        Hide
        jira-bot ASF subversion and git services added a comment -

        Commit 6ae5e9219fe56baef60c3592c3f56e74fe5906a3 in branch refs/heads/master from James Peach
        [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=6ae5e92 ]

        TS-2372: include openssl/ec.h

        Show
        jira-bot ASF subversion and git services added a comment - Commit 6ae5e9219fe56baef60c3592c3f56e74fe5906a3 in branch refs/heads/master from James Peach [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=6ae5e92 ] TS-2372 : include openssl/ec.h
        Hide
        jira-bot ASF subversion and git services added a comment -

        Commit 14ef40ef2f3bd4c62ed18a5737508167a57d371e in branch refs/heads/master from James Peach
        [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=14ef40e ]

        TS-2372: improved OpenSSL EC key support detection

        Show
        jira-bot ASF subversion and git services added a comment - Commit 14ef40ef2f3bd4c62ed18a5737508167a57d371e in branch refs/heads/master from James Peach [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=14ef40e ] TS-2372 : improved OpenSSL EC key support detection
        Hide
        jira-bot ASF subversion and git services added a comment -

        Commit 44fe5296ee5d5b2e96d27918c4b57f7fb4343ec2 in branch refs/heads/master from Leif Hedstrom
        [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=44fe529 ]

        TS-2372 Make ecdh CTX prototype follow SNI, and fix unused ctx on some platforms

        Show
        jira-bot ASF subversion and git services added a comment - Commit 44fe5296ee5d5b2e96d27918c4b57f7fb4343ec2 in branch refs/heads/master from Leif Hedstrom [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=44fe529 ] TS-2372 Make ecdh CTX prototype follow SNI, and fix unused ctx on some platforms

          People

          • Assignee:
            jamespeach James Peach
            Reporter:
            bcall Bryan Call
          • Votes:
            1 Vote for this issue
            Watchers:
            8 Start watching this issue

            Dates

            • Created:
              Updated:
              Resolved:

              Development