On 15:53 Fri 14 Sep     , Apollon Oikonomopoulos wrote:
> The tests in t/50reverse-proxy-proxy-protocol.t and 
> t/40session-ticket.t report no session reuse with OpenSSL 1.1.1 and 
> need further investigation.

t/40session-ticket.t is a false positive: in TLSv1.3 session information 
is sent after the handshake has finished, and the way s_client is 
invoked in the test means that it can exit before it receives the 
session data. Until this is fixed upstream, I patched the test to always 
use TLSv1.2.

t/50reverse-proxy-session-resumption.t needs further investigation, but 
it seems that H2O's client code doesn't support session resumption for 
TLSv1.3 upstreams (which is H2O itself in the test case). I'm tempted to 
just disable the test even if resumption is indeed broken for TLSv1.3 
upstreams.

Reply via email to