Example TLS / SSL potentially insecure
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openstack-manuals |
Fix Released
|
Critical
|
Bryan D. Payne |
Bug Description
Originally posted on oss-security here: http://
> *) mod_ssl: New directive SSLSessionTickets (On|Off).
> The directive controls the use of TLS session tickets (RFC 5077),
> default value is "On" (unchanged behavior).
> Session ticket creation uses a random key created during web
> server startup and recreated during restarts. No other key
> recreation mechanism is available currently. Therefore using
> session
> tickets without restarting the web server with an appropriate
> frequency
> (e.g. daily) compromises perfect forward secrecy. [Rainer Jung]
>
>
> So if you use Apache 2.4 and care about PFS protecting your data, you
> should turn this feature off. This appears to be an implementation issue
> because there is no other way for Apache to recreate keys. I don't know
> a lot about the fine details of Session Tickets, but can anyone care to
> comment if there are other known bad implementations of session tickets
> out there? Does this affect Apache 2.2? Nginx? Lighttpd?
This may be pedantic but it might also be worth ensuring we are providing secure defaults in our example configurations for TLS termination / proxies here - http://
Changed in openstack-manuals: | |
importance: | Undecided → Critical |
status: | New → Triaged |
assignee: | nobody → Bryan D. Payne (bdpayne) |
Changed in openstack-manuals: | |
status: | Triaged → In Progress |
Fix proposed to branch: master /review. openstack. org/157146
Review: https:/