[Matt's reply is likely to be high latency] On 07/24/2017 08:53 PM, Neetish Pathak wrote:
Maybe I misunderstand the question, but isn't this is just a natural consequence of the server (mis)behavior in (2)?
From a quick look through the state machine code, this is supposed to work. But someone would probably have to instrument the code (e.g., with printf) to tell why the delay is being introduced. I don't think I have the availability to do so in the near future, myself.
It seems like it hasn't really sunk in for you that TLS 1.3 is a seriously different protocol than TLS 1.2, and it provides stronger security properties, remediating weaknesses of TLS 1.2. So no, we should not recommend TLS 1.2 resumption on the LAN -- we should recommend the more secure option! If you continue to believe that latency trumps everything else, you could experiment with SSL_OP_ALLOW_NO_DHE_KEX to cut out some of the heavier-weight asymmetric crypto, though it looks like you'd want to patch ssl/statem/extensions_clnt.c to not send TLSEXT_KEX_MODE_KE_DHE, as I don't see a way to configure the server to prefer the non-DHE PSK key exchange. -Ben |
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users