Re: SSL_SESSION_set1_ticket ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On Apr 2, 2019, at 11:17 AM, Jeremy Harris <jgh@xxxxxxxxxxx> wrote:
> 
> If I understand right from rfc5077 the next record from the server after
> the server-hello should have been an empty session_ticket, if it was
> going to accept the resumed session.  But it goes on to a full handshake
> instead.
> 
> Is there any way of finding out what it didn't like?

Does the server have a temporally stable ticket decryption key?
Is this Exim?  Is the server's SSL_CTX persistent and shared
across multiple connections?  IIRC Exim has a completely fresh
SSL stack initialized after fork for every client...

-- 
	Viktor.




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux