SecureServerOptions
Properties
Indicates whether half-opened TCP connections are allowed.
If set, this will be called when a client opens a connection using the ALPN extension. One argument will be passed to the callback: an object containing servername
and protocols
fields, respectively containing the server name from the SNI extension (if any) and an array of ALPN protocol name strings. The callback must return either one of the strings listed in protocols
, which will be returned to the client as the selected ALPN protocol, or undefined
, to reject the connection with a fatal alert. If a string is returned that does not match one of the client's ALPN protocols, an error will be thrown. This option cannot be used with the ALPNProtocols
option, and setting both options will throw an error.
An array of strings or a Buffer naming possible ALPN protocols. (Protocols should be ordered by their priority.)
Cert chains in PEM format. One cert chain should be provided per private key. Each cert chain should consist of the PEM formatted certificate for a provided private key, followed by the PEM formatted intermediate certificates (if any), in order, and not including the root CA (the root CA must be pre-known to the peer, see ca). When providing multiple cert chains, they do not have to be in the same order as their private keys in key. If the intermediate certificates are not provided, the peer will not be able to validate the certificate, and the handshake will fail.
Name of an OpenSSL engine which can provide the client certificate.
A string describing a named curve or a colon separated list of curve NIDs or names, for example P-521:P-384:P-256, to use for ECDH key agreement. Set to auto to select the curve automatically. Use crypto.getCurves() to obtain a list of available curve names. On recent releases, openssl ecparam -list_curves will also display the name and description of each available elliptic curve. Default: tls.DEFAULT_ECDH_CURVE.
When enabled, TLS packet trace information is written to stderr
. This can be used to debug TLS connection problems.
Abort the connection if the SSL/TLS handshake does not finish in the specified number of milliseconds. A 'tlsClientError' is emitted on the tls.Server object whenever a handshake times out. Default: 120000 (120 seconds).
Attempt to use the server's cipher suite preferences instead of the client's. When true, causes SSL_OP_CIPHER_SERVER_PREFERENCE to be set in secureOptions
If set to a positive number, it sets the initial delay before the first keepalive probe is sent on an idle socket.
Private keys in PEM format. PEM allows the option of private keys being encrypted. Encrypted keys will be decrypted with options.passphrase. Multiple keys using different algorithms can be provided either as an array of unencrypted key strings or buffers, or an array of objects in the form {pem:
Optionally set the maximum TLS version to allow. One of 'TLSv1.3'
, 'TLSv1.2'
, 'TLSv1.1'
, or 'TLSv1'
. Cannot be specified along with the secureProtocol
option, use one or the other. Default: 'TLSv1.3'
, unless changed using CLI options. Using --tls-max-v1.2
sets the default to 'TLSv1.2'
. Using --tls-max-v1.3
sets the default to 'TLSv1.3'
. If multiple of the options are provided, the highest maximum is used.
Optionally set the minimum TLS version to allow. One of 'TLSv1.3'
, 'TLSv1.2'
, 'TLSv1.1'
, or 'TLSv1'
. Cannot be specified along with the secureProtocol
option, use one or the other. It is not recommended to use less than TLSv1.2, but it may be required for interoperability. Default: 'TLSv1.2'
, unless changed using CLI options. Using --tls-v1.0
sets the default to 'TLSv1'
. Using --tls-v1.1
sets the default to 'TLSv1.1'
. Using --tls-min-v1.3
sets the default to 'TLSv1.3'. If multiple of the options are provided, the lowest minimum is used.
Shared passphrase used for a single private key and/or a PFX.
Indicates whether the socket should be paused on incoming connections.
PFX or PKCS12 encoded private key and certificate chain. pfx is an alternative to providing key and cert individually. PFX is usually encrypted, if it is, passphrase will be used to decrypt it. Multiple PFX can be provided either as an array of unencrypted PFX buffers, or an array of objects in the form {buf:
Name of an OpenSSL engine to get private key from. Should be used together with privateKeyIdentifier.
Identifier of a private key managed by an OpenSSL engine. Should be used together with privateKeyEngine. Should not be set together with key, because both options define a private key in different ways.
hint to send to a client to help with selecting the identity during TLS-PSK negotiation. Will be ignored in TLS 1.3. Upon failing to set pskIdentityHint tlsClientError
will be emitted with ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED
code.
If true the server will reject any connection which is not authorized with the list of supplied CAs. This option only has an effect if requestCert is true.
If true the server will request a certificate from clients that connect and attempt to verify that certificate. Defaults to false.
An optional TLS context object from tls.createSecureContext()
Optionally affect the OpenSSL protocol behavior, which is not usually necessary. This should be used carefully if at all! Value is a numeric bitmask of the SSL_OP_* options from OpenSSL Options
Legacy mechanism to select the TLS protocol version to use, it does not support independent control of the minimum and maximum version, and does not support limiting the protocol to TLSv1.3. Use minVersion and maxVersion instead. The possible values are listed as SSL_METHODS, use the function names as strings. For example, use 'TLSv1_1_method' to force TLS version 1.1, or 'TLS_method' to allow any TLS protocol version up to TLSv1.3. It is not recommended to use TLS versions less than 1.2, but it may be required for interoperability. Default: none, see minVersion.
Opaque identifier used by servers to ensure session state is not shared between applications. Unused by clients.
The number of seconds after which a TLS session created by the server will no longer be resumable. See Session Resumption for more information. Default: 300.
SNICallback(servername, cb)
48-bytes of cryptographically strong pseudo-random data.
Specifies a timeout in milliseconds that a server should wait when an `'unknownProtocol'` is emitted. If the socket has not been destroyed by that time the server will destroy it.