Hi Olivier,

Great to see a version of more ‘secure’ 0-RTT implementation.

> Le 2 oct. 2017 à 17:18, Olivier Houchard <[email protected]> a écrit :
> 
> Hi,
> 
> The attached patches add experimental support for 0-RTT with OpenSSL 1.1.1
> They are based on Emmanuel's previous patches, so I'm submitting them again,
> updated to reflect the changes in OpenSSL API, and with a few fixes.
> To allow the use of early data, one has to explicitely add "allow-0rtt" to
> its bind line. If early data are provided by the client, a
> "Early-Data: 1" header will be added, to let the origin server know that.
> 
> Because early data have security implications, a new sample fetch was added,
> "ssl_fc_has_early", a boolean that will be evaluated to true if early data
> were provided, as well as new action, "wait-for-handshake", which will make
> haproxy wait for the completion of the SSL handshake before processing the
> request. After the handshake, early data are considered as normal data, and
> they won't be reported to the origin server.
> 
> As usual, bugs are to be expected, and any review and/or test will be
> appreciated.
> 

I have tested the experimental version of 0-RTT few months ago with BoringSSL
and the option it’s a great candidate to per-certificat parameter. I attach the 
patch
to show howto set it (without BC_SSL_O_* flag).

I hope to be able to review your work in more detail.

++
Manu

Attachment: early_data.diff
Description: Binary data

Reply via email to