@@ -102,9 +102,8 @@ pluggable cipher adapters. You can also disable encryption by choosing `none` ad
102
102
103
103
Session identifier length is by default 16 bytes (randomly generated data with OpenSSL
104
104
` RAND_pseudo_bytes ` function). The server secret is also generated by default with this same
105
- function, and its length is determined by calculating the used ` $session_aes_size ` divided
106
- by 8 (so by default it uses 32 bytes). This will work until Nginx is restarted, but you might want
107
- to consider setting your own secret using ` set $session_secret 623q4hR325t36VsCD3g567922IC0073T; ` ,
105
+ function and it's default length is 32 bytes. This will work until Nginx is restarted, but you
106
+ might want to consider setting your own secret using ` set $session_secret 623q4hR325t36VsCD3g567922IC0073T; ` ,
108
107
for example (this will work in farms installations as well, but you are then responsible for
109
108
rotating the secret). On farm installations you should also configure other session configuration
110
109
variables the same on all the servers in the farm.
@@ -745,28 +744,28 @@ as where the original cookie was delivered. This check is disabled by default.
745
744
` session.check.scheme ` is additional check to validate that the request was made using the same protocol
746
745
as the one used when the original cookie was delivered. This check is enabled by default.
747
746
748
- #### number session.cipher.size (deprecated in 2.1, use session.aes.size)
747
+ #### number session.cipher.size (deprecated in 2.1 and removed in 2.2 , use session.aes.size)
749
748
750
749
` session.cipher.size ` holds the size of the cipher (` lua-resty-string ` supports AES in ` 128 ` , ` 192 ` ,
751
750
and ` 256 ` bits key sizes). See ` aes.cipher ` function in ` lua-resty-string ` for more information.
752
751
By default this will use ` 256 ` bits key size. This can be configured with Nginx
753
752
` set $session_cipher_size 256; ` .
754
753
755
- #### string session.cipher.mode (deprecated in 2.1, use session.aes.mode)
754
+ #### string session.cipher.mode (deprecated in 2.1 and removed in 2.2 , use session.aes.mode)
756
755
757
756
` session.cipher.mode ` holds the mode of the cipher. ` lua-resty-string ` supports AES in ` ecb ` , ` cbc ` ,
758
757
` cfb1 ` , ` cfb8 ` , ` cfb128 ` , ` ofb ` , and ` ctr ` modes (ctr mode is not available with 256 bit keys).
759
758
See ` aes.cipher ` function in ` lua-resty-string ` for more information. By default ` cbc ` mode is
760
759
used. This can be configured with Nginx ` set $session_cipher_mode cbc; ` .
761
760
762
- #### function session.cipher.hash (deprecated in 2.1, use session.aes.hash)
761
+ #### function session.cipher.hash (deprecated in 2.1 and removed in 2.2 , use session.aes.hash)
763
762
764
763
` session.cipher.hash ` is used in ecryption key, and iv derivation (see: OpenSSL
765
764
[ EVP_BytesToKey] ( https://www.openssl.org/docs/crypto/EVP_BytesToKey.html ) ). By default ` sha512 ` is
766
765
used but ` md5 ` , ` sha1 ` , ` sha224 ` , ` sha256 ` , and ` sha384 ` are supported as well in ` lua-resty-string ` .
767
766
This can be configured with Nginx ` set $session_cipher_hash sha512; ` .
768
767
769
- #### number session.cipher.rounds (deprecated in 2.1, use session.aes.rounds)
768
+ #### number session.cipher.rounds (deprecated in 2.1 and removed in 2.2 , use session.aes.rounds)
770
769
771
770
` session.cipher.rounds ` can be used to slow-down the encryption key, and iv derivation. By default
772
771
this is set to ` 1 ` (the fastest). This can be configured with Nginx ` set $session_cipher_rounds 1; ` .
@@ -830,7 +829,7 @@ set $session_check_ua on;
830
829
set $session_check_scheme on;
831
830
set $session_check_addr off;
832
831
set $session_identifier_length 16;
833
- # these are deprecated in 2.1, use session_aes_* instead
832
+ # these are deprecated in 2.1 and removed in 2.2 , use session_aes_* instead
834
833
set $session_cipher_mode cbc;
835
834
set $session_cipher_size 256;
836
835
set $session_cipher_hash sha512;
0 commit comments