Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ELY-1191 Undertow CLIENT_CERT via Elytron and HTTP/2 does not work #832

Merged
merged 1 commit into from May 28, 2017

Conversation

stuartwdouglas
Copy link
Contributor

This will also fix CLIENT_CERT in the case where SSL is being terminated at the reverse proxy and the certificate information is being provided by headers.

Copy link
Contributor

@darranl darranl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we have no cache available then maybe it would be better to authorize without a cache at all.

An alternative could be to cache against the connection but this is maybe risky if a proxy re-uses connections.

@darranl darranl added the -1 DAL label May 24, 2017
@stuartwdouglas
Copy link
Contributor Author

I have added getSslSession to the HTTP/2 server connection so caching will be possible for HTTP/2 as well (once undertow 1.4.16.Final is out), however I think there is a use case for disabling caching entirely. Consider what happens if the load balancer terminates SSL to the client, but then sends the SSL information via headers to be backend over an encrypted connection.

What is required to actually disable caching? Do I just return true immediately?

@darranl
Copy link
Contributor

darranl commented May 25, 2017

It is Ok, I will add a commit to this, was going to try yesterday but Kerberos took a while.

Where no SSLSession is available the createIdentityCache method should just return null instead of returning a Function to create a dummy cache. We can then skip the call to attemptReauthentication as if we know there is no real cache reauthentication could never succeed. For the normal authentication we can then just switch to the standard AuthorizeCallback if we know there is no cache available so this will also skip the step storing the identity in the dummy cache.

@darranl
Copy link
Contributor

darranl commented May 25, 2017

I have followed up here to switch off caching entirely if no SSLSession is available #841

@sguilhen sguilhen merged commit 55e8e8e into wildfly-security:master May 28, 2017
@sguilhen
Copy link
Contributor

I believe this can be closed now as #841 has been merged?

@stuartwdouglas stuartwdouglas deleted the ELY-1191 branch June 1, 2017 00:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
3 participants