> I think I will go for the hack that misuses re-negotiation as a kind of
> heartbeat, keep alive or echo request. I tried to avoid this hack at
> first because it is a computational burden. AFAIK re-negotiation means
> restarting from scratch which means that expensive public key operations
> have to be performed.

to avoid expensive full handshakes, what about using sessions?

from what i read at http://tools.ietf.org/html/rfc4347#section-3, "To the 
greatest extent possible, DTLS is identical to TLS."

and from what i read at http://tools.ietf.org/html/rfc5238 section 3.4: 
"multiple DTLS connections can be resumed from the same DTLS session, each 
running over its own DCCP connection."

so my assumption here is that DTLS supports abbreviated handshakes for session 
resumptions.

_________________________________________________________________
Windows Live™ Hotmail®: Chat. Store. Share. Do more with mail. 
http://windowslive.com/explore?ocid=TXT_TAGLM_WL_t1_hm_justgotbetter_explore_012009______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to