Skip to content

Added SSL related fields to access.log#122

Closed
acaciocenteno wants to merge 1 commit intoapache:5.1.xfrom
aziontech:access_log_ssl_protocol_fields
Closed

Added SSL related fields to access.log#122
acaciocenteno wants to merge 1 commit intoapache:5.1.xfrom
aziontech:access_log_ssl_protocol_fields

Conversation

@acaciocenteno
Copy link
Copy Markdown
Contributor

Added three fields to access log:

  • SSL version, for instance 'TLSv1/SSLv3'.
  • SSL cipher suite, for instance 'ECDHE-RSA-AES128-GCM-SHA256'
  • SSL session reused.

@sc0ttbeardsley
Copy link
Copy Markdown
Contributor

How will SPDY-enabled connections be logged?

@acaciocenteno
Copy link
Copy Markdown
Contributor Author

Did a test using spdycat and ATS did no log the SSL infos. Will dig into the code tomorrow to learn why.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This would return cipher's version like TLSv1/SSLv3 or SSLv2. For SSL protocol version , I think it would be better to use SSL_get_version.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agreed, SSL_get_version is probably what you want here.

@sc0ttbeardsley
Copy link
Copy Markdown
Contributor

We should probably track this as a jira item...

@jpeach
Copy link
Copy Markdown
Contributor

jpeach commented Oct 23, 2014

I don't like that this adds extra fields to HttpSM, can we avoid that by accessing the netvc? or is it too late by the time we want to log?

@SolidWallOfCode
Copy link
Copy Markdown
Member

While I agree with James' distaste, it will be rare for the NetVC to be around to provide this information.

My recommendation at this point is to set up a sub struct for the HttpSM to hold data that is purely for logging, so at least it doesn't clutter the HttpSM directly. This is a problem that is going to come up again, where we want to log data that is not extant at the point the transaction is logged.

@jpeach
Copy link
Copy Markdown
Contributor

jpeach commented Jan 29, 2015

FWIW for this specific case, you can use the sslheaders plugin as a workaround. Put the values you want into HTTP headers, then log those. In fact, maybe using @headers is a reasonable solution to @SolidWallOfCode's logging data problem.

@bryancall
Copy link
Copy Markdown
Contributor

There is a related Jira for this:
Desire support for client TLS cipher in custom log format
https://issues.apache.org/jira/browse/TS-3648

@shinrich
Copy link
Copy Markdown
Member

@fpesce got the ssl_session_reuse in TS-3683 (cqssl rather than cssr for the log field). It also includes session reuse via tickets.

Being able to record the the selected cipher and negotiated protocol would still be valuable. I see that @ericcarlschwartz is working on the related bug TS-3648. Hopefully he can pull these changes in via that issue.

@asfgit asfgit closed this in e445bcd Sep 15, 2015
hnakamur pushed a commit to hnakamur/trafficserver that referenced this pull request Jan 5, 2016
…cache_basics

Add some translations to cache basics
shinrich pushed a commit that referenced this pull request Jul 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants