On Mon, Mar 21, 2005 at 05:41:56PM +0100, Dr. Stephen Henson wrote:

> > In my server cache I have: 1900 entries occupying 2.4MBytes (in a btree
> > totaling 7MB on disk) with an average size of 1300 bytes per entry
> > (key + value). 977 of these entries are a mere 327 bytes long (no client
> > cert), the rest of the sessions are 2.4k in average size and occupy 90%
> > of the space. The vast majority of the client certs are unverified
> > and waste space. Reducing resource requirements makes a server more
> > DoS resistant. I think the feature I am looking for, a function that
> > clears and frees the peer certificate from a session, is cheap enough
> > to warrant implementation.
> > 
> 
> I'm curious as to what purpose these unverified certificates serve? If they
> aren't used in any way why are they requested in the first place?
> 

I request client certificates because I need to authenticate a small
number of clients (currently 1). When I ask for client certificates, all
clients that have a client certificate (often self-signed) volunteer their
certificates during the handshake. I don't need them, but I get them.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to