summaryrefslogtreecommitdiffstats
path: root/doc/man3/SSL_read_early_data.pod
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2018-06-22 16:05:27 +0200
committerMatt Caswell <matt@openssl.org>2018-06-26 19:09:46 +0200
commit41145c35bfee8f2b0822288fcb23a807d06d8e89 (patch)
tree3b22237440fe18555bba5d3d18947956d895b43c /doc/man3/SSL_read_early_data.pod
parentUse stateful tickets if we are doing anti-replay (diff)
downloadopenssl-41145c35bfee8f2b0822288fcb23a807d06d8e89.tar.xz
openssl-41145c35bfee8f2b0822288fcb23a807d06d8e89.zip
Document changes to SSL_OP_NO_TICKET for TLSv1.3
Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/6563)
Diffstat (limited to 'doc/man3/SSL_read_early_data.pod')
-rw-r--r--doc/man3/SSL_read_early_data.pod14
1 files changed, 8 insertions, 6 deletions
diff --git a/doc/man3/SSL_read_early_data.pod b/doc/man3/SSL_read_early_data.pod
index bc5bd0a084..6a76ec2923 100644
--- a/doc/man3/SSL_read_early_data.pod
+++ b/doc/man3/SSL_read_early_data.pod
@@ -226,12 +226,14 @@ was submitted will be ignored). Note that single use tickets are enforced even
if a client does not send any early data.
The replay protection mechanism relies on the internal OpenSSL server session
-cache (see L<SSL_CTX_set_session_cache_mode(3)>). By default sessions will be
-added to the cache whenever a session ticket is issued. When a client attempts
-to resume the session OpenSSL will check for its presence in the internal cache.
-If it exists then the resumption is allowed and the session is removed from the
-cache. If it does not exist then the resumption is not allowed and a full
-handshake will occur.
+cache (see L<SSL_CTX_set_session_cache_mode(3)>). When replay protection is
+being used the server will operate as if the SSL_OP_NO_TICKET option had been
+selected (see L<SSL_CTX_set_options(3)>). Sessions will be added to the cache
+whenever a session ticket is issued. When a client attempts to resume the
+session, OpenSSL will check for its presence in the internal cache. If it exists
+then the resumption is allowed and the session is removed from the cache. If it
+does not exist then the resumption is not allowed and a full handshake will
+occur.
Note that some applications may maintain an external cache of sessions (see
L<SSL_CTX_sess_set_new_cb(3)> and similar functions). It is the application's