Enable TLS session tickets
Finally, found a way to enable TLS session tickets on win2k12 r2 and win2k16. You need to follow these steps:
Create a key (
DWORD) in registry with value 1HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\EnableSslSessionTicketCreate a new TLS session ticket key through this Powershell command:
New-TlsSessionTicketKey -Password <password> -Path "C:\KeyConfig\TlsSessionTicketKey.config" -ServiceAccountName "System"Enable TLS session ticket key through this Powershell command:
Enable-TlsSessionTicketKey -Password <password> -Path "C:\KeyConfig\TlsSessionTicketKey.config" -ServiceAccountName "System"Reboot the server to enable TLS session ticket generation. Reboot is required for the registry entry to take effect.
IMPORTANT: To re-use same TLS session tickets across load-balanced servers, you need to copy "C:\KeyConfig\TlsSessionTicketKey.config" file generated after running "New-TlsSessionTicketKey" command on one of the servers and then copy the config file on all remaining servers and run "Enable-TlsSessionTicketKey" PowerShell command on each file. Unfortunately, this worked for me only on win2k16.
https://technet.microsoft.com/en-us/itpro/powershell/windows/tls/new-tlssessionticketkey
Comments
Post a Comment