Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

SSL: allow configuring providers with "ssl_provider ...".#710

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Draft
bavshin-f5 wants to merge2 commits intonginx:master
base:master
Choose a base branch
Loading
frombavshin-f5:ssl-provider

Conversation

bavshin-f5
Copy link
Member

Posting just for completeness, as I'm not convinced we need to support this. Everything in this PR is achievable viaOPENSSL_CONF.
On the other hand, we already havessl_engine device; that duplicates openssl.cnf functionality (default_algorithms = ALL in the engine section).

Currently does not support tracking and unloading providers added through the nginx.conf.OSSL_PROVIDER_unload() does not actually unload and teardown the provider, but it unregisters the store URI schemes and algorithm implementations and allows re-loading the provider with different configuration, which seems useful.

See also:https://github.com/openssl/openssl/blob/master/doc/designs/ossl-provider-load-ex.md

@afshinpir
Copy link

I think if we have an entry to represent OpenSSL v3.0's querystrings, it will be much more useful. Because it helps to for example enable fips by passing that querystring to algorithms. This cannot be achieved via configuration file well. Something like this:

ssl_provider_query_string "fips=yes"

Though, it is completely openssl related configuration.

@josuerocha
Copy link

josuerocha commentedJun 5, 2025
edited
Loading

Hello@bavshin-f5, very interesting.
Today, without this change, is it possible to rely solely on a provider to retrieve key and certificate for HTTPS connection?

It seems to me that specifying thessl_certificate andssl_certificate_key are still mandatory. I don't have these paths, since I would like to rely on my provider to load the keys from my tamper-resistant chip.

I think this newssl_provider directive would allow doing what I would like to do?

@afshinpir
Copy link

@josuerocha
It is possible to use provider right now from PR#436 which is merged on the master even without this PR is your provider supports STORE_API.

@josuerocha
Copy link

Thank you for your response,@afshinpir .

I have a more specific follow-up question:

As of NGINX version 1.25.4, is it possible to configure OpenSSL providers, via an OpenSSL configuration file, in such a way that the provider's key and certificate can be used by NGINX to establish TLS connections?

From what I understand, the pull request you referenced enables selecting specific keys. However, is it also possible for the provider to expose a default key that NGINX could use without explicitly selecting it?

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Reviewers
No reviews
Assignees
No one assigned
Labels
None yet
Projects
None yet
Milestone
No milestone
Development

Successfully merging this pull request may close these issues.

3 participants
@bavshin-f5@afshinpir@josuerocha

[8]ページ先頭

©2009-2025 Movatter.jp