On 15:53 Fri 14 Sep , Apollon Oikonomopoulos wrote: > The tests in t/50reverse-proxy-proxy-protocol.t and > t/40session-ticket.t report no session reuse with OpenSSL 1.1.1 and > need further investigation.
t/40session-ticket.t is a false positive: in TLSv1.3 session information is sent after the handshake has finished, and the way s_client is invoked in the test means that it can exit before it receives the session data. Until this is fixed upstream, I patched the test to always use TLSv1.2. t/50reverse-proxy-session-resumption.t needs further investigation, but it seems that H2O's client code doesn't support session resumption for TLSv1.3 upstreams (which is H2O itself in the test case). I'm tempted to just disable the test even if resumption is indeed broken for TLSv1.3 upstreams.