blob: 9fc612ae8566f46366cd564e56067e1a16c0c24a [file] [log] [blame]
.. _security-options:
Security Options
****************
.. Licensed to the Apache Software Foundation (ASF) under one
or more contributor license agreements. See the NOTICE file
distributed with this work for additional information
regarding copyright ownership. The ASF licenses this file
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing,
software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied. See the License for the
specific language governing permissions and limitations
under the License.
.. _controlling-client-access-to-cache:
Controlling Client Access to the Proxy Cache
============================================
Traffic Server can be confgiured to allow only certain clients to use
the proxy cache.
#. Add a line to :file:`ip_allow.config` for each IP address or
range of IP addresses allowed to access Traffic Server.
#. Run the command :option:`traffic_line -x` to apply the configuration
changes.
.. _configuring-dns-server-selection-split-dns:
Configuring DNS Server Selection (Split DNS)
============================================
The *Split DNS* option enables you to configure Traffic Server to use
multiple DNS servers, as dictated by your security requirements. For
example, you might configure Traffic Server to use one set of DNS
servers to resolve hostnames on your internal network, while allowing
DNS servers outside the firewall to resolve hosts on the Internet. This
maintains the security of your intranet, while continuing to provide
direct access to sites outside your organization.
To configure Split DNS:
#. Specify the rules for performing DNS server selection based on the
destination domain, the destination host, or a URL regular expression.
These rules are located in :file:`splitdns.config`.
#. Enable the *Split DNS* option by adjusting :ts:cv:`proxy.config.dns.splitDNS.enabled`
in :file:`records.config`. ::
CONFIG proxy.config.dns.splitDNS.enabled INT 1
#. Run the command :option:`traffic_line -x` to apply the configuration changes.
.. _configuring-ssl-termination:
Using SSL Termination
=====================
The Traffic Server *SSL termination* option enables you to secure
connections in reverse proxy mode between a client and a Traffic Server
and/or Traffic Server and an origin server.
The following sections describe how to enable and configure the SSL
termination option.
- Enable and configure SSL termination for client/Traffic Server
connections: :ref:`admin-client-and-traffic-server-connections`
- Enable and configure SSL termination for Traffic Server/origin server
connections: :ref:`admin-traffic-server-and-origin-server-connections`
.. _client-and-traffic-server-connections:
Client and Traffic Server Connections
-------------------------------------
.. XXX sanity check/second opinions on example paths used for certs/keys below
The figure below illustrates communication between a client and Traffic
Server (and between Traffic Server and an origin server) when the SSL
termination option is enabled and configured for Client/Traffic
Server connections only.
.. figure:: ../static/images/admin/ssl_c.jpg
:align: center
:alt: Client and Traffic Server communication using SSL termination
Client and Traffic Server communication using SSL termination
.. Manual list numbering below corresponds to figure markings above.
The figure above depicts the following:
1. The client sends an HTTPS request for content. Traffic Server receives the
request and performs the SSL handshake to authenticate the client (depending
on the authentication options configured) and determine the encryption
method that will be used. If the client is allowed access, then Traffic
Server checks its cache for the requested content.
2. If the request is a cache hit and the content is fresh, then Traffic Server
encrypts the content and sends it to the client. The client decrypts the
content (using the method determined during the handshake) and displays it.
3. If the request is a cache miss or cached content is stale, then Traffic
Server communicates with the origin server via HTTP and obtains a plain text
version of the content. Traffic Server saves the plain text version of the
content in its cache, encrypts the content, and sends it to the client. The
client decrypts and displays the content.
To configure Traffic Server to use the SSL termination option for
Client/Traffic Server connections, you must do the following:
#. Obtain and install an SSL server certificate from a recognized
certificate authority. The SSL server certificate contains
information that enables the client to authenticate Traffic Server
and exchange encryption keys.
#. Set the port number used for SSL communication using
:ts:cv:`proxy.config.http.server_ports` in :file:`records.config`.
#. Set the appropriate base path for your SSL certificates and private keys
in :file:`records.config`. ::
CONFIG proxy.config.ssl.server.cert.path STRING "/opt/ts/etc/ssl/certs/"
CONFIG proxy.config.ssl.server.private_key.path STRING "/opt/ts/etc/ssl/keys/"
#. Add an entry to :file:`ssl_multicert.config` for each certificate and key
which your Traffic Server system will be using to terminate SSL connections
with clients. ::
ip_dest=1.2.3.4 ssl_cert_name=example.com.pem
ip_dest=* ssl_cert_name=default.pem
#. *Optional*: Configure the use of client certificates using the variable
:ts:cv:`proxy.config.ssl.client.certification_level` in :file:`records.config`.
If you configure Traffic Server to require client certificates, then Traffic
Server verifies the client certificate during the SSL handshake that
authenticates the client. If you configure Traffic Server to not require
client certificates, or if you configure certificates to be optional and the
connecting client does not present one, then access to Traffic Server is
managed through other Traffic Server options that have been set (such as
rules in :file:`ip_allow.config`). ::
CONFIG proxy.config.ssl.client.certification_level INT 0
This variable permits one of the following values to be set:
===== =======================================================================
Value Description
===== =======================================================================
``0`` Client certificates not required.
``1`` Client certificates optional. If present, will be used to validate.
``2`` Client certficates required, and must validate based on configured CAs.
===== =======================================================================
#. *Optional*: Configure the use of Certification Authorities (CAs). CAs add
security by verifying the identity of the person requesting a certificate.
The list of acceptable CA signers is configured with
:ts:cv:`proxy.config.ssl.CA.cert.path` in :file:`records.config`. ::
CONFIG proxy.config.ssl.CA.cert.path STRING "/opt/CA/certs/private-ca.pem"
#. Run the command :option:`traffic_line -L` to restart Traffic Server on the
local node or :option:`traffic_line -M` to restart Traffic Server on all
the nodes in a cluster.
.. _traffic-server-and-origin-server-connections:
Traffic Server and Origin Server Connections
--------------------------------------------
.. XXX sanity check/second opinions on example paths used for certs/keys below
The figure below illustrates communication between Traffic Server and an
origin server when the SSL termination option is enabled for Traffic
Server/origin server connections.
.. figure:: ../static/images/admin/ssl_os.jpg
:align: center
:alt: Traffic Server and origin server communication using SSL termination
Traffic Server and origin server communication using SSL termination
.. Manual list numbering below corresponds to figure markings above.
The figure above depicts the following:
1. If a client request is a cache miss or is stale, then Traffic Server sends
an HTTPS request for the content to the origin server. The origin server
receives the request and performs the SSL handshake to authenticate Traffic
Server and determine the encryption method to be used.
2. If Traffic Server is allowed access, then the origin server encrypts the
content and sends it to Traffic Server, where it is decrypted (using the
method determined during the handshake). A plain text version of the content
is saved in the cache, if Traffic Server deems the content cacheable.
3. If SSL termination is enabled for Client/Traffic Server connections, then
Traffic Server re-encrypts the content and sends it to the client via HTTPS,
where it is decrypted and displayed. If SSL termination is not enabled for
Client/Traffic Server connections, then Traffic Server sends the plain text
version of the content to the client via HTTP.
To configure Traffic Server to use the SSL termination option for Traffic Server
and origin server connections, you must do the following:
#. Ensure first that your origin server responds properly to SSL requests, and
configure it for client certificate validation if you intend to use that as
part of your access control scheme.
Refer to your origin server's documentation for details. If your origin
server is another Traffic Server system, then you may follow the steps
outlined in `Client and Traffic Server Connections`_ for configuring the
origin server to validate client certificates.
#. *Optional*: Obtain and install an SSL client certificate from a recognized
certificate authority, if your origin server requires client certificate
validation for access control. Your client certificate must be signed by a
Certificate Authority recognized by your origin server.
If you are using a client certificate, you must add its location to
:file:`records.config` in the setting :ts:cv:`proxy.config.ssl.client.cert.path`
and :ts:cv:`proxy.config.ssl.client.cert.filename`. ::
CONFIG proxy.config.ssl.client.cert.path STRING "/opt/ts/etc/ssl/certs/"
CONFIG proxy.config.ssl.client.cert.filename STRING "client.pem"
You must also provide the paths to the private key for this certificate,
unless the key is contained within the same file as the certificate, using
:ts:cv:`proxy.config.ssl.client.private_key.path` and
:ts:cv:`proxy.config.ssl.client.private_key.filename`. ::
CONFIG proxy.config.ssl.client.private_key.path STRING "/opt/ts/etc/ssl/keys/"
CONFIG proxy.config.ssl.client.private_key.filename STRING "client.pem"
#. Enable or disable, per your security policy, server SSL certificate
verification using :ts:cv:`proxy.config.ssl.client.verify.server` in
:file:`records.config`. ::
CONFIG proxy.config.ssl.client.verify.server INT 1
#. Add the collection of authorized Certificate Authorities to the Traffic
Server configuration in :file:`records.config` using the settings
:ts:cv:`proxy.config.ssl.client.CA.cert.path` and
:ts:cv:`proxy.config.ssl.client.CA.cert.filename`. ::
CONFIG proxy.config.ssl.client.CA.cert.path STRING "/opt/ts/etc/ssl/certs/"
CONFIG proxy.config.ssl.client.CA.cert.filename STRING "CAs.pem"
#. Run the command :option:`traffic_line -L` to restart Traffic Server on the
local node or :option:`traffic_line -M` to restart Traffic Server on all
the nodes in a cluster.