On Wed, Sep 30, 2020, at 01:14, Michael D'Errico wrote:
> Also, are you sure you want to do this?  The design of
> TLS 1.3 was supposed to make it fast, but creating a
> pseudo session ticket for every connection requiring a
> HRR and then validating and decoding it is going to be
> really slow.  And your data center is going to get hotter
> because your servers will be compute bound instead of
> memory bound (if they even were).

It's symmetric crypto[1].  Hardly worth noting.

[1] Mostly.  NSS wraps the symmetric key with an asymmetric key so that server 
clusters can share session ticket encryption keys without needing 
interconnects.  But encryption or decryption only happens once per instance.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to