Skip to content
Snippets Groups Projects
Select Git revision
  • 8dcd0bf737658f49df3d46049d740bed012aa4c2
  • master default protected
  • b24
  • ll-workflow
  • alc-scindage-donnees-pj
  • FJ_LL_Tbl_Contrat
  • alc-docker-node
  • ll-apiplatform
  • php84
  • ll-rgpd
  • b23
  • alc-filtre-type-intervenant
  • ll-sans-mdb5
  • formules-ancienne-infra
  • ll-formules
  • alc-intervenant-dmep
  • ll-suppr-v_vol-s
  • b20
  • ll-postgresql
  • b23.0.1
  • b22
  • 24.8
  • 24.7
  • 24.6
  • 24.5
  • 24.4
  • 24.3
  • 24.2
  • 24.1
  • 24.0
  • 23.15
  • 24.0-beta19
  • 24.0-beta18
  • 24.0-beta17
  • 24.0-beta16
  • 24.0-beta15
  • 24.0-beta14
  • 24.0-beta13
  • 23.14
  • 24.0-beta12
  • 24.0-beta11
41 results

php.conf

Blame
  • Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    tls-cache 3.61 KiB
    ######################################################################
    #
    #  This virtual server controls caching of TLS sessions.
    #
    #  When a TLS session is used, the server will automatically create
    #  the following attributes in the session-state list.  These attributes
    #  are the the ones for the *server* certificate.
    #
    #	       TLS-Cert-Serial
    #	       TLS-Cert-Expiration
    #	       TLS-Cert-Subject
    #	       TLS-Cert-Issuer
    #	       TLS-Cert-Common-Name
    #	       TLS-Cert-Subject-Alt-Name-Email
    #
    #  If a client certificate is required (e.g. EAP-TLS or sometimes PEAP / TTLS),
    #  the following attributes are also created in the session-state list:
    #
    #	       TLS-Client-Cert-Serial
    #	       TLS-Client-Cert-Expiration
    #	       TLS-Client-Cert-Subject
    #	       TLS-Client-Cert-Issuer
    #	       TLS-Client-Cert-Common-Name
    #	       TLS-Client-Cert-Subject-Alt-Name-Email
    #
    #
    #	$Id$
    #
    ######################################################################
    server tls-cache {
    
    #
    #  Only the "authorize" section is needed.
    #  Only the listed Autz-Types are used.
    #  Everything else in the virtual server is ignored.
    #
    #  The attribute &TLS-Session-Id is set to the identity
    #  of the session to read / write / delete from the cache.  This
    #  identity is an opaque blob.
    #
    authorize {
    
    	#
    	#  This section is run whenever the server needs to read an
    	#  entry from the TLS session cache.
    	#
    	#  It should read the attribute &session-state:TLS-Session-Data
    	#  from the cache, along with any other attributes which
    	#  were in the cache
    	#
    	#  On success it should return 'ok' or 'updated'.
    	#
    	#  The return code has no real effect on session processing
    	#  and will just cause the server to emit a warning.
    	#
    	Autz-Type Session-Cache-Read {
    		update control {
    			Cache-Allow-Insert := no
    		}
    		cache_tls_session
    	}
    
    	#
    	#  This section is run whenever the server needs to write an
    	#  entry to the TLS session cache.
    	#
    	#  It should write the attribute &session-state:TLS-Session-Data
    	#  to the cache, along with any other attributes which
    	#  need to be cached.
    	#
    	#  On success it should return 'ok' or 'updated'.
    	#
    	#  The return code has no real effect on session processing
    	#  and will just cause the server to emit a warning.
    	#
    	Autz-Type Session-Cache-Write {
    		update control {
    			Cache-TTL := 0
    		}
    		cache_tls_session
    	}
    
    	#
    	#  This section is run whenever the server needs to delete an
    	#  entry from the TLS session cache.
    	#
    	#  On success it should return 'ok', 'updated', 'noop' or 'notfound'
    	#
    	#  The return code has no real effect on session processing
    	#  and will just cause the server to emit a warning.
    	#
    	Autz-Type Session-Cache-Delete {
    		update control {
    			Cache-TTL := 0
    			Cache-Allow-Insert := no
    		}
    		cache_tls_session
    	}
    
    	#
    	#  This section is run after certificate attributes are added
    	#  to the request list, and before performing OCSP validation.
    	#
    	#  It should read the attribute &control:TLS-OCSP-Cert-Valid
    	#  from the cache.
    	#
    	#  On success it should return 'ok', 'updated', 'noop' or 'notfound'
    	#  To force OCSP validation failure, it should return 'reject'.
    	#
    	Autz-Type OCSP-Cache-Read {
    		update control {
    			Cache-Allow-Insert := no
    		}
    		cache_ocsp
    	}
    
    	#
    	#  This section is run after OCSP validation has completed.
    	#
    	#  It should write the attribute &reply:TLS-OCSP-Cert-Valid
    	#  to the cache.
    	#
    	#  On success it should return 'ok' or 'updated'.
    	#
    	#  The return code has no real effect on session processing
    	#  and will just cause the server to emit a warning.
    	#
    	Autz-Type OCSP-Cache-Write {
    		update control {
    			Cache-TTL := "%{expr:&reply:TLS-OCSP-Next-Update * -1}"
    			Cache-Allow-Merge := no
    		}
    		cache_ocsp
    	}
    }
    }