mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-05 04:57:35 +03:00
crypto/tls: add support for session ticket key rotation
This change adds a new method to tls.Config, SetSessionTicketKeys, that changes the key used to encrypt session tickets while the server is running. Additional keys may be provided that will be used to maintain continuity while rotating keys. If a ticket encrypted with an old key is provided by the client, the server will resume the session and provide the client with a ticket encrypted using the new key. Fixes #9994 Change-Id: Idbc16b10ff39616109a51ed39a6fa208faad5b4e Reviewed-on: https://go-review.googlesource.com/9072 Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
cf04082452
commit
7576470d56
10 changed files with 367 additions and 242 deletions
|
@ -422,15 +422,38 @@ func TestClientResumption(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
testResumeState("Handshake", false)
|
||||
testResumeState("Resume", true)
|
||||
|
||||
if _, err := io.ReadFull(serverConfig.rand(), serverConfig.SessionTicketKey[:]); err != nil {
|
||||
t.Fatalf("Failed to invalidate SessionTicketKey")
|
||||
getTicket := func() []byte {
|
||||
return clientConfig.ClientSessionCache.(*lruSessionCache).q.Front().Value.(*lruSessionCacheEntry).state.sessionTicket
|
||||
}
|
||||
randomKey := func() [32]byte {
|
||||
var k [32]byte
|
||||
if _, err := io.ReadFull(serverConfig.rand(), k[:]); err != nil {
|
||||
t.Fatalf("Failed to read new SessionTicketKey: %s", err)
|
||||
}
|
||||
return k
|
||||
}
|
||||
|
||||
testResumeState("Handshake", false)
|
||||
ticket := getTicket()
|
||||
testResumeState("Resume", true)
|
||||
if !bytes.Equal(ticket, getTicket()) {
|
||||
t.Fatal("first ticket doesn't match ticket after resumption")
|
||||
}
|
||||
|
||||
key2 := randomKey()
|
||||
serverConfig.SetSessionTicketKeys([][32]byte{key2})
|
||||
|
||||
testResumeState("InvalidSessionTicketKey", false)
|
||||
testResumeState("ResumeAfterInvalidSessionTicketKey", true)
|
||||
|
||||
serverConfig.SetSessionTicketKeys([][32]byte{randomKey(), key2})
|
||||
ticket = getTicket()
|
||||
testResumeState("KeyChange", true)
|
||||
if bytes.Equal(ticket, getTicket()) {
|
||||
t.Fatal("new ticket wasn't included while resuming")
|
||||
}
|
||||
testResumeState("KeyChangeFinish", true)
|
||||
|
||||
clientConfig.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_RC4_128_SHA}
|
||||
testResumeState("DifferentCipherSuite", false)
|
||||
testResumeState("DifferentCipherSuiteRecovers", true)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue