https://issues.apache.org/bugzilla/show_bug.cgi?id=52703

--- Comment #6 from Eric Covener <[email protected]> 2012-03-03 01:46:26 UTC ---
I clicked through.  In the failing case the client tries to resume the session
and does not set a server_name extension in the handshake.  The resume seems to
succeed (the session ID itself is not in the parsed trace, but the exchange is
clearly very short).

Presumably openssl doesn't save/restore this info in the session, because it
comes in on a part of the handshake that isn't abbreviated (initial client
hello).

When the same client isn't trying to resume a session, it sends the server_name
extension.

It does not seem to directly explain why the clients do the right thing with
SSL session caching disabled, since all things being equal they should just
continue down the "fail" case but with a new session created.

So in short, Apache uses the extension when it's present in the handshake.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to