On Tue, July 2, 2013 2:02 pm, Paul Hoffman wrote:
>  On Jul 2, 2013, at 1:52 PM, Ben Laurie <b...@links.org> wrote:
>
> > Alternatively, we stay in this world, clients expire sessions hourly,
> > and we're all happy.
>
>  Is this what most recent browsers do? They expire their TLS sessions after
>  an hour? That would be nice.
>
>  --Paul Hoffman

Firefox and Chrome use a 24-hour period, as recommended - see
http://mxr.mozilla.org/nss/source/lib/ssl/sslnonce.c#21

CryptoAPI/SChannel defaults to 10 hours, but I don't know if IE is
tweaking that at all - see dwSessionLifespan for
http://msdn.microsoft.com/en-us/library/windows/desktop/aa379810(v=vs.85).aspx

OS X/SecureTransport uses ten minutes as the default - see
SESSION_CACHE_TTL in
http://www.opensource.apple.com/source/Security/Security-55179.11/libsecurity_ssl/security_ssl/appleSession.c

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to