Dietmar,
Thanks for the response. See my responses below.
Looks like IO::Socket::SSL has more options than AnyEvent::TLS, for example, the SSL_version allows TLSv11 and TLSv12 to be specified, SSL_honor_cipher_order is an option, etc. I have never created my own web server or worked with AnyEvent, so I am not sure if IO::Socket::SSL can replace AnyEvent::TLS or if just works with it or if it can even be used with IO::Socket::SSL at this point.
Are you opposed to using IO::Socket::SSL? The options that would be useful are SSLHonorCipherOrder and SSLProtocol. SSLInsecureRenegotiation is off by default with IO::Socket::SSL and the AnyEvent::TLS module docs do not mention this option. Also, I do not see that any of these modules support SSLCryptoDevice, so that is not an an option.
The override option would be great.
Thanks for the response. See my responses below.
Also, I would like to have the following SSL options. These are from apache, so I am not sure how they translate to the web server you are using now.
SSLHonorCipherOrder [ on ]
SSLProtocol [ all SSLv3 TLSv1 TLSv1.1 TLSv1.2 and in the future TLSv1.3 ]
SSLInsecureRenegotiation [ on off ]
SSLCryptoDevice [ Options can be found via openssl engine ]
We wrote our own server, based on AnyEvent:
https://git.proxmox.com/?p=pve-mana...28eb2a9f0a0ded3f03c195ca2fb9e81e02b11;hb=HEAD
https://git.proxmox.com/?p=pve-mana...c308ea6d6601b886b0dec2bada3d4c3da65d0;hb=HEAD
Looks like IO::Socket::SSL has more options than AnyEvent::TLS, for example, the SSL_version allows TLSv11 and TLSv12 to be specified, SSL_honor_cipher_order is an option, etc. I have never created my own web server or worked with AnyEvent, so I am not sure if IO::Socket::SSL can replace AnyEvent::TLS or if just works with it or if it can even be used with IO::Socket::SSL at this point.
Are you opposed to using IO::Socket::SSL? The options that would be useful are SSLHonorCipherOrder and SSLProtocol. SSLInsecureRenegotiation is off by default with IO::Socket::SSL and the AnyEvent::TLS module docs do not mention this option. Also, I do not see that any of these modules support SSLCryptoDevice, so that is not an an option.
Constraining users is not the answer. Please consider moving the CA file to the server side so each server can use the correct CA for the certificate on that server.
The idea of the cluster is that all nodes in a cluster shares some attributes, for example the CA. But I am open for improvements here, for example we can provide a way to override the CA at node level.
The override option would be great.