File: sslheaders.en.rst

package info (click to toggle)
trafficserver 9.2.5%2Bds-0%2Bdeb12u3
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 64,964 kB
  • sloc: cpp: 345,958; ansic: 31,184; python: 25,297; sh: 7,023; makefile: 3,045; perl: 2,255; java: 277; pascal: 119; sql: 94; xml: 2
file content (91 lines) | stat: -rw-r--r-- 4,198 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
.. _admin-plugins-ssl-headers:

SSL Headers Plugin
******************

.. Licensed to the Apache Software Foundation (ASF) under one
   or more contributor license agreements.  See the NOTICE file
   distributed with this work for additional information
   regarding copyright ownership.  The ASF licenses this file
   to you under the Apache License, Version 2.0 (the
   "License"); you may not use this file except in compliance
   with the License.  You may obtain a copy of the License at

   http://www.apache.org/licenses/LICENSE-2.0

   Unless required by applicable law or agreed to in writing,
   software distributed under the License is distributed on an
   "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
   KIND, either express or implied.  See the License for the
   specific language governing permissions and limitations
   under the License.

The ``sslheaders`` plugins injects SSL session information into
HTTP request headers. It can operate as a global plugin or as a
remap plugin.

Plugin Options
--------------

The following options may be specified when loading the plugin in
:file:`plugin.config` or :file:`remap.config`:

--attach=WHICH  This option specifies which HTTP request the SSL headers are
                attached to.

                ``client`` causes the headers to be injected into
                the client request. This is primarily useful if another plugin
                should inspect then. ``server`` is the default and injects the
                headers into the origin server request. ``both`` injects the
                headers into both the client request and the origin server
                request.

A list of `KEY=VALUE` pairs follows any options. The `KEY` names the HTTP
header to inject, and `VALUE` names the SSL session field.

======================  ===============================================
SSL session field       Description
======================  ===============================================
client.certificate      The client certificate in PEM format
client.subject          The client certificate subject DN
client.issuer           The client certificate issuer DN
client.serial           The client certificate serial number in hexadecimal format
client.signature        The client certificate signature in hexadecimal format
client.notbefore        The client certificate validity start time
client.notafter         The client certificate validity end time
server.certificate      The server certificate in PEM format
server.subject          The server certificate subject DN
server.issuer           The server certificate issuer DN
server.serial           The server certificate serial number in hexadecimal format
server.signature        The server certificate signature in hexadecimal format
server.notbefore        The server certificate validity start time
server.notafter         The server certificate validity end time
======================  ===============================================

The `client.certificate` and `server.certificate` fields emit
the corresponding certificate in PEM format, with newline characters
replaced by spaces.

If the ``sslheaders`` plugin activates on non-SSL connections, it
will delete all the configured HTTP header names so that malicious
clients cannot inject misleading information. If any of the SSL
fields expand to an empty string, those headers are also deleted.

Examples:
---------

In this example, the origin server is interested in the subject of
the server certificate that was used to accept a client connection.
We can apply the ``sslheaders`` plugin to a generic remap rule to
provide this information. The :file:`remap.config` configuration
would be::

  regex_map https://*.example.com/ http://origin.example.com/ \
    @plugin=sslheaders.so @pparam=SSL-Server=server.subject

In this example, we have set :ts:cv:`proxy.config.ssl.client.certification_level`
to request SSL client certificates. We can then configure ``sslheaders``
to populate the client certificate subject globally by adding it
to :file:`plugin.config`::

  sslheaders.so SSL-Client-ID=client.subject SSL-Client-NotBefore=client.notbefore SSL-Client-NotAfter-client.notafter