Like I think I mentioned a few days ago, I'm currently on a conference. I'll
take this up in more depth later this week.
I have a question, though... Kurt said at some point that all that was needed
on the VMS side was to collect data, the rest can be done elsewhere
(thankfully). However, I don
> On Apr 22, 2018, at 9:49 PM, Viktor Dukhovni
> wrote:
>
> - Client-side diagnostics -
On the server side I see that even when the ticket callback returns "0" to
accept and not re-issue the ticket, a new ticket is requested anyway. I'd like
to be able to control this, and not issu
> On Apr 23, 2018, at 3:35 AM, Matt Caswell wrote:
>
>> * With TLS 1.3 a new session is generated even sessions are
>>resumed, because the server responds with a new ticket
>>in the event of session resumption. With TLS 1.2 sessions
>>that had sufficient remaining lifetime did not
On 21/04/18 13:22, Salz, Rich wrote:
> Anyone up for a doing a PR that adds these to objects.txt?
They're already in there:
https://github.com/openssl/openssl/blob/master/crypto/objects/objects.txt#L1581
Matt
>
> On 4/20/18, 5:23 PM, "internet-dra...@ietf.org"
> wrote:
>
>
> A
I can possibly provide some input having done similar for a number of platforms
and written faster but equivalent entropy assessment code to NIST's (for the
second draft of SP 800-90B rather than the final version).
I'm not knowledgeable about VMS though.
We could discuss further at ICMC if you
On Sat, Apr 07, 2018 at 04:58:06PM +0200, Richard Levitte wrote:
> In the mean time, I've spent a few days going through the docs on all
> kinds of data that you can get out from the VMS kernel, most notably
> through a system service called sys$getrmi()... there's a gazillion
> data points, a tre
In message on Sun, 22 Apr
2018 21:49:42 -0400, Viktor Dukhovni said:
openssl-users> * Postfix logs a warning when the compile-time and runtime
openssl-users> libraries are not exactly the same (once per process start),
openssl-users> this is expected. Perhaps we should provide a mean
I tested a Postfix server and client built against OpenSSL 1.1.0,
using 1.1.1 run-time libraries. This exercised peer certificate
fingerprint matching and session resumption. No major issues.
The only interesting observations are:
* With TLS 1.3 a new session is generated even sessions are
On 23/04/18 02:49, Viktor Dukhovni wrote:
>
> I tested a Postfix server and client built against OpenSSL 1.1.0,
> using 1.1.1 run-time libraries. This exercised peer certificate
> fingerprint matching and session resumption. No major issues.
>
> The only interesting observations are:
>
> *
> On Apr 22, 2018, at 12:16 PM, Richard Levitte wrote:
>
> openssl-users> > We are considering if we should enable TLS 1.3 by default or
> not,
> openssl-users> > or when it should be enabled. For that, we would like to
> know how
> openssl-users> > applications behave with the current versio
In message <431270c5-3da3-4a9d-9292-12adc46cc...@dukhovni.org> on Sat, 21 Apr
2018 14:45:34 -0400, Viktor Dukhovni said:
openssl-users> > We are considering if we should enable TLS 1.3 by default or
not,
openssl-users> > or when it should be enabled. For that, we would like to know
how
openssl
11 matches
Mail list logo