diff options
author | Matt Caswell <matt@openssl.org> | 2018-06-22 16:05:27 +0200 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-06-26 19:09:46 +0200 |
commit | 41145c35bfee8f2b0822288fcb23a807d06d8e89 (patch) | |
tree | 3b22237440fe18555bba5d3d18947956d895b43c /doc/man3/SSL_read_early_data.pod | |
parent | Use stateful tickets if we are doing anti-replay (diff) | |
download | openssl-41145c35bfee8f2b0822288fcb23a807d06d8e89.tar.xz openssl-41145c35bfee8f2b0822288fcb23a807d06d8e89.zip |
Document changes to SSL_OP_NO_TICKET for TLSv1.3
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6563)
Diffstat (limited to 'doc/man3/SSL_read_early_data.pod')
-rw-r--r-- | doc/man3/SSL_read_early_data.pod | 14 |
1 files changed, 8 insertions, 6 deletions
diff --git a/doc/man3/SSL_read_early_data.pod b/doc/man3/SSL_read_early_data.pod index bc5bd0a084..6a76ec2923 100644 --- a/doc/man3/SSL_read_early_data.pod +++ b/doc/man3/SSL_read_early_data.pod @@ -226,12 +226,14 @@ was submitted will be ignored). Note that single use tickets are enforced even if a client does not send any early data. The replay protection mechanism relies on the internal OpenSSL server session -cache (see L<SSL_CTX_set_session_cache_mode(3)>). By default sessions will be -added to the cache whenever a session ticket is issued. When a client attempts -to resume the session OpenSSL will check for its presence in the internal cache. -If it exists then the resumption is allowed and the session is removed from the -cache. If it does not exist then the resumption is not allowed and a full -handshake will occur. +cache (see L<SSL_CTX_set_session_cache_mode(3)>). When replay protection is +being used the server will operate as if the SSL_OP_NO_TICKET option had been +selected (see L<SSL_CTX_set_options(3)>). Sessions will be added to the cache +whenever a session ticket is issued. When a client attempts to resume the +session, OpenSSL will check for its presence in the internal cache. If it exists +then the resumption is allowed and the session is removed from the cache. If it +does not exist then the resumption is not allowed and a full handshake will +occur. Note that some applications may maintain an external cache of sessions (see L<SSL_CTX_sess_set_new_cb(3)> and similar functions). It is the application's |