jarmka
Occasional Visitor
Is ssl caching anything like tls session ticketing in pixelserv-tls? What is the difference? Enabling session tickets we effectively lose forward secrecy; an integral part of securing TLS. This leaves me curious as to how pixelserv uses tls certs and session tickets. Does pixelserv use and cache the exact same certs issued to a specific application like a web browser? How does it affect all the clients on a network using pixelserv-tls, and if the router is compromised, can this cache can be used to decipher users encrypted sessions? If so this could potentially make routers using pixelsrv-tls targets for ransom. These are potential issues that should be emphasized if they are offered these features, and it would be useful to have options to disable TLS session tickets, allow cert storage only in volatile memory, as well as purge rotation periods. Personally I prefer security over speed.
#1 ssllabs/ssllabs-scan#367
As explained in the second link below,
#2 https://timtaubert.de/blog/2014/11/...-side-tls-session-resumption-implementations/
Is it possible to disable ssl cache & tls session ticketing in pixelsrv-tls?
and
Is it possible to implement a feature in pixelsrv-tls to disable tls-session tickets globally; that would benefit an entire network enforcing strict forward secrecy globally? I'm searching for a solution for chrome but I cannot find any means of disabling them; as https://www.ssllabs.com/ssltest/viewMyClient.html demonstrates.
#1 ssllabs/ssllabs-scan#367
As explained in the second link below,
"To support session resumption via session IDs the server must maintain a cache that maps past session IDs to those sessions’ secret states. The cache itself is the main weak spot, stealing the cache contents allows to decrypt all sessions whose session IDs are contained in it."
"The forward secrecy of a connection is thus bounded by how long the session information is retained on the server. Ideally, your server would use a medium-sized cache that is purged daily. Purging your cache might however not help if the cache itself lives on a persistent storage as it might be feasible to restore deleted data from it. An in-memory storage should be more resistant to these kind of attacks if it turns over about once a day and ensures old data is overridden properly."
#2 https://timtaubert.de/blog/2014/11/...-side-tls-session-resumption-implementations/
Is it possible to disable ssl cache & tls session ticketing in pixelsrv-tls?
and
Is it possible to implement a feature in pixelsrv-tls to disable tls-session tickets globally; that would benefit an entire network enforcing strict forward secrecy globally? I'm searching for a solution for chrome but I cannot find any means of disabling them; as https://www.ssllabs.com/ssltest/viewMyClient.html demonstrates.
Last edited: