On Thu, Aug 20, 2020 at 04:59:49PM +0300, Thorsten Habich wrote:
> > - Do FAILURES happen ONLY after a session is RESUMED.
>
> Sorry, no. The first connection decides if the problem occurs or not.
> If the session is resumed the error only occurs *if the first
> connection failed*.
Thanks for the answer. This means that there are no issues recording
the proper validation status in the session cache, and the issue is
entirely validation failure on initial handshake.
I don't recall seeing any logging posted showing those initial
validation failures. This might be as good a time as any to address
that (the failure logs for the initial connection should have been part
of the post that started this thread).
> If the first connection was successful the error will not appear. The
> status then seem to change in case of a restart (as clarified by Victor
> that clears the session cache) or after I assume
> tlsproxy_tls_session_cache_timeout (default: 3600).
>
> In the examples I found in our logs, after a failed connection, the
> first successful delivery without a restart was made after 1h + x minutes.
This is of course expected. With a 1h session cache lifetime, new full
handshakes happen only after the previous saved session has expired. I
would recommend a shorter session lifetime for now. It will help to get
a better handle on the problem, by doing the initial handshake more
frequently.
> For sessions which do not get resumed at all the error occurs
> frequently, too.
Yes, that's why you're seeing problems on resumption.
> If I remember correctly the certificate verification with connection
> reuse (so the tlsproxy gets involved) was fixed with:
You keep talking about connection reuse, as though it were somehow
relevant, even though I haven't seen anything in this thread that
suggests that connection reuse is in any involved. Why do you
believe that connection reuse is a factor in this issue?
I hope you're not still conflating session resumption with connection
reuse.
--
Viktor.