On 06.02.2015 18:50, Dennis Jacobfeuerborn wrote:
> On 06.02.2015 14:13, Lukas Tribus wrote:
>>> I tried to implement these recommendations but didn't seem to get
>>> results I was expecting. How exactly does one reliably test that the
>>> 1-RTT handshake is actually working?
>>
>> Enable TFO and announce "http/1.1" via NPN and ALPN, that should
>> do it.
>>
>> But your client will have to support all those features as-well (for
>> example TFO can't possibly work in Windows).
>>
>> You will have to capture the TLS handshake in wireshark to see
>> how fast it was (in terms of time and RTT's).
> 
> This is really what I'm trying to get at. What is a specific way to test
> this? Which clients do support a 1-RTT handshake and what would a
> Wireshark session look like where the 1-RTT handshake succeeds compared
> to one which doesn't.
> 
> There is a lot of information about this on the internet.
> All of it extremely vague. Surely there must be a way to come up with a
> test scenario that can verify such a setup more deterministically?

Case in point: In the attached capture it looks like tls false start is
working yet I actually haven't activated npn/alpn on the haproxy side
which means tls false start should fail, no?

Regards,
  Dennis
No.     Time           Source                Destination           Protocol 
Length Info
      4 0.000219000    10.99.0.1             10.99.0.202           TLSv1.2  583 
   Client Hello
      5 0.000490000    10.99.0.202           10.99.0.1             TLSv1.2  227 
   Server Hello, Change Cipher Spec, Encrypted Handshake Message
      7 0.001503000    10.99.0.1             10.99.0.202           TLSv1.2  141 
   Change Cipher Spec, Encrypted Handshake Message
      8 0.001594000    10.99.0.1             10.99.0.202           TLSv1.2  727 
   Application Data
     10 0.002317000    10.99.0.202           10.99.0.1             TLSv1.2  231 
   Application Data

Reply via email to