-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Full TLS proxying #769
Labels
Milestone
Comments
It seems 50% of CDN clients require TLS encrypted traffic. Since backends are client-manageable, TLS 1.3 only is enough for client side. Backends are also trusted, so it seems we don't need to do full certificates chain validation and/or can use pre-shared keys. Thus, it seems we don't need neither OCSP stapling #831 nor clients certificates validation #830 for this task, |
Closed
Closed
krizhanovsky
modified the milestones:
1.1 TBD - ML, DoH and other features after 1.0,
0.8 TLS 1.3 & TDBv0.2 - Beta
May 5, 2021
Closed
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Protocol
Currently Tempesta can only terminate TLS traffic acting as a TLS accelerator/terminator. However, CDNs and filtering networks do require full TLS, i.e. establish encrypted channel between Tempesta and origin servers. Thousands upstream servers are possible in application delivery network (ADN) scenarios, so
connect()
over TLS must be fast enough.Only TLS 1.3 #1031 should be supported.
Following features must be supported:
inet_pton()
). Alternatively we can uselinux/net/dns_resolver
.Cryptography
TLS client side involves ECDSA signature verification, i.e. calculation of
m * G + n * Q
, which is done byttls_ecp_muladd()
in simplest way. The Shamir's trick and/or multi-exponentiation (Bodo Möller, "Algorithms for multi-exponentiation") should be used. See OpenSSL'sec_wNAF_mul()
as the reference.The text was updated successfully, but these errors were encountered: