Re: [openssl-users] Session Ticket Support in Openssl TLS 1.2

2017-06-20 Thread Neetish Pathak
I wanted to understand the replay attack vulnerability in case of enable early data of TLS 1.3 while false start is secure in that respect as I have read from https://github.com/openssl/openssl/issues/1541 So, with false start, the application data is sent from client after the first leg of the

Re: [openssl-users] Session Ticket Support in Openssl TLS 1.2

2017-06-20 Thread Matt Caswell
On 19/06/17 19:11, Neetish Pathak wrote: > 2) Can you suggest some places to put a time stamp in OpenSSL code. I agree with Ben's responses to all your other questions. For this question, I'm not sure what you are trying to achieve? Starting before SSL_accept/SSL_connect and finishing after

Re: [openssl-users] Session Ticket Support in Openssl TLS 1.2

2017-06-20 Thread Neetish Pathak
Thanks Ben for all the replies and your comments. They are extremely useful for my study On Mon, Jun 19, 2017 at 9:21 PM, Benjamin Kaduk wrote: > On 06/19/2017 04:12 PM, Neetish Pathak wrote: > > > > On Mon, Jun 19, 2017 at 11:11 AM, Neetish Pathak >

Re: [openssl-users] Session Ticket Support in Openssl TLS 1.2

2017-06-20 Thread Neetish Pathak
I Appreciate your response On Tue, Jun 20, 2017 at 2:09 AM, Matt Caswell wrote: > > > On 19/06/17 19:11, Neetish Pathak wrote: > > 2) Can you suggest some places to put a time stamp in OpenSSL code. > > I agree with Ben's responses to all your other questions. For this >