Раздел 10. Apache modules Пункты: 85 86 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 163 164 165 166 167 168 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 203 204 205 206 207 208 209 210 211 212 213 RU EN Пункт 191. Apache Module mod_session_crypto
SummaryWarningThe session modules make use of HTTP cookies, and as such can fall victim to Cross Site Scripting attacks, or expose potentially private information to clients. Please ensure that the relevant risks have been taken into account before enabling the session functionality on your server. This submodule of This can help provide privacy to user sessions where the contents of the session should be kept private from the user, or where protection is needed against the effects of cross site scripting attacks. For more details on the session interface, see the documentation for
the Basic UsageTo create a simple encrypted session and store it in a cookie called session, configure the session as follows: Browser based encrypted sessionSession On SessionCookieName session path=/ SessionCryptoPassphrase secret The session will be encrypted with the given key. Different servers can be configured to share sessions by ensuring the same encryption key is used on each server. If the encryption key is changed, sessions will be invalidated automatically. For documentation on how the session can be used to store username
and password details, see the SessionCryptoCipher Directive
The Possible values depend on the crypto driver in use, and could be one of:
SessionCryptoDriver Directive
The The NSS crypto driver requires some parameters for configuration, which are specified as parameters with optional values after the driver name. NSS without a certificate databaseSessionCryptoDriver nss NSS with certificate databaseSessionCryptoDriver nss dir=certs NSS with certificate database and parametersSessionCryptoDriver nss dir=certs key3=key3.db cert7=cert7.db secmod=secmod NSS with paths containing spacesSessionCryptoDriver nss "dir=My Certs" key3=key3.db cert7=cert7.db secmod=secmod The NSS crypto driver might have already been
configured by another part of the server, for example from
NSS with certificate databaseSessionCryptoDriver nss noinit To prevent confusion, ensure that all modules requiring NSS are configured with identical parameters. The openssl crypto driver supports an optional parameter to specify the engine to be used for encryption. OpenSSL with engine supportSessionCryptoDriver openssl engine=name SessionCryptoPassphrase Directive
The Keys are more secure when they are long, and consist of truly random characters. Changing the key on a server has the effect of invalidating all existing sessions. Multiple keys can be specified in order to support key rotation. The first key listed will be used for encryption, while all keys listed will be attempted for decryption. To rotate keys across multiple servers over a period of time, add a new secret to the end of the list, and once rolled out completely to all servers, remove the first key from the start of the list. As of version 2.4.7 if the value begins with exec: the resulting command will be executed and the first line returned to standard output by the program will be used as the key. #key used as-is SessionCryptoPassphrase secret #Run /path/to/program to get key SessionCryptoPassphrase exec:/path/to/program #Run /path/to/otherProgram and provide arguments SessionCryptoPassphrase "exec:/path/to/otherProgram argument1" SessionCryptoPassphraseFile Directive
The Unlike the Multiple keys can be specified in order to support key rotation. The first key listed will be used for encryption, while all keys listed will be attempted for decryption. To rotate keys across multiple servers over a period of time, add a new secret to the end of the list, and once rolled out completely to all servers, remove the first key from the start of the list. Пункты: 85 86 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 163 164 165 166 167 168 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 203 204 205 206 207 208 209 210 211 212 213 |