94
Chapter 11
Security Options
Client and Traffic Server connections
Figure 11-2. illustrates communication between a client and Traffic Server, and between Traffic Server and
an origin server when the SSL termination option is enabled and configured for client/Traffic Server
connections only.
Figure 11-2. Client and Traffic Server communication using SSL termination
To configure Traffic Server to use the SSL termination option for client/Traffic Server connections:
•
Obtain and install an SSL server certificate from a recognized certificate authority (such as VeriSign). The
SSL server certificate contains information that allows the client to authenticate Traffic Server and
exchange secret encryption keys.
•
Set configuration variables in the
records.config
file to:
o
Enable the SSL termination option
o
Set the port number used for SSL communication
o
Specify the filename and location of the server certificate
o
Configure the use of client certificates (optional)
Client certificates are located on the client. If you configure Traffic Server to require client certificates,
Traffic Server verifies the client certificate during the SSL handshake to authenticate the client. This
authentication process is transparent to the user. If you configure Traffic Server to not require client
certificates, access to Traffic Server is managed through access control lists and other Traffic Server
options that have been set (for example rules in the
ip_allow.config
file and LDAP-based proxy
authentication).
o
Specify the file name and location of the Traffic Server’s private key (if the private key is not located
in the server certificate file)
Traffic Server uses its private key during the SSL handshake to decrypt the session encryption keys.
The private key must be stored and protected against theft.
o
Configure the use of certification authorities (CAs) - Optional
CAs provide added security when using client certificates by verifying the identity of the person
requesting a certificate.
origin server
The client sends an HTTPS request for content. Traffic Server receives the request and performs
the SSL handshake to authenticate the client (depending on the authentication options configured)
and to determine the encryption method to be used.
If the client is allowed access, Traffic Server checks its cache for the requested content.
If the request is a cache miss or is stale, Traffic Server communicates with the origin Server via
HTTP and obtains the plain text version of the content. Traffic Server saves the plain text version
of the content in its cache, and then encrypts the content and sends it to the client, where it is
decrypted and displayed.
1
3
1
3
2
HTTPS request
Client
HTTP
Encrypted secure connection
2
If the request is a cache hit and the content is fresh, Traffic Server encrypts the content and
sends it to the client, where it is decrypted (using the method determined during the handshake)
and displayed.
Traffic
Server