Thanks Salz and Benjamin for your feedback. Indeed my Wireshark version was
unable to decode TLS 1.3. I got an update from the shared link.

I had one doubt about the server side session caching. I read that server
side server caching is disabled by default. Then, how is session resumption
possible using session identifiers because that is is stateful resumption
as I have understood with servers maintaining the session info. Whereas
with session tickets, client maintains the session tickets.
I am getting confused on the session caching concept. Could someone please
clarify.

Also, for TLS 1.3, should the server caching be enabled for session
resumption ?

Thanks
BR,
Neetish

On Sat, Jun 10, 2017 at 7:09 AM, Salz, Rich <rs...@akamai.com> wrote:

> > It is quite likely that your version of wireshark does not know how to
> properly decode the TLS 1.3 ServerHello.
>
> Please see  https://www.ietf.org/mail-archive/web/tls/current/
> msg22333.html for information about downloading an early release of
> wireshark.
>
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to