Fwd: Automatic pooling of upstream keepalive connections (patch proposal)
greg at adallom.com
Sun Sep 15 16:30:00 UTC 2013
While I agree that precise host comparison is suboptimal, I think that in
this case it's better to chose the strictest (and simplest) approach for
the sake of security.
Here is a slightly revised version of the patch:
I've attempted to think of a nice way to decouple the code, but I couldn't
think of anything pretty. At this point I've put some ifdefs around the
code that references the keepalive module from the proxy and upstream
This coupling is similar to the existing coupling of the
"ngx_http_upstream_round_robin" module with the upstream module. In that
case, the round robin balancer is used as a default for "un-resolved"
I guess the right solution for the problem at hand should involve
configuring both the balancer and keepalive (and other upstream options)
for the default case.
On Wed, Sep 11, 2013 at 7:32 PM, Maxim Dounin <mdounin at mdounin.ru> wrote:
> On Wed, Sep 11, 2013 at 06:54:00PM +0300, Greg Vishnepolsky wrote:
> > However, in case of SSL connections, it is insufficient to identify a
> > according to the sockaddr. The hostname is important. For examlple:
> > https://a.host.com resolves to 184.108.40.206:443
> > https://b.host.com also resoves to 220.127.116.11:443
> > If the server at 18.104.22.168 holds an SSL cert _only_ for a.host.com, it
> > be wrong to use keepalive connections that were opened to this sockaddr
> > requests for b.host.com. If a connection will not be reused, during SSL
> > handshake the host cert can be properly verified for each new host.
> > The solution that I implemented for this is to add a "host" field to
> > "ngx_http_upstream_keepalive_cache_t" and
> > "ngx_http_upstream_keepalive_peer_data_t". The function
> > "ngx_http_upstream_get_keepalive_peer" now also checks that the host
> > matches, as well as the sockaddr to reuse a keepalive connection.
> As of now, there is no SSL certificate verification in proxy, and
> hence there is no need for a check here.
> With ceritificate verification introduction some check will be
> needed, but just a host equality check might be suboptimal - e.g., a
> certificate might be for *.example.com, and both a.example.com and
> b.example.com are valid hostnames for a connection, but a host
> check won't allow a connection reuse. Possible solution would be
> to check SSL peer name on an already established connection.
> SNI will also complicate things once introduced. But much like
> the certificate verification, it's a separate problem.
> Maxim Dounin
> nginx-devel mailing list
> nginx-devel at nginx.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the nginx-devel