[openssl-users] disable session id reuse
Devang Kubavat
digant.kubavat at gmail.com
Sun May 6 08:11:46 UTC 2018
Hi Darshan,
In Addition, Make sure that you should disable the session ticket based session resumption using SSL_OP_NO_TICKET.
By default SSL_OP_NO_TICKET is not disabled.
Thanks
Devang
Sent from my iPhone
> On 03-May-2018, at 2:12 PM, Mody, Darshan (Darshan) <darshanmody at avaya.com> wrote:
>
> Hi,
>
> While doing a openssl s_time command I find that by default it tries for Session Id Reuse. “Now timing with session id reuse.”
>
> In case if we don’t want openssl to reuse session id’s how can we configure openssl in the application for the same.
>
> The application here is acting as a server.
>
> I have set SSL_CTX_set_session_cache_mode to SSL_SESS_CACHE_OFF
>
> Thanks
> Darshan
> --
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20180506/57a56724/attachment-0001.html>
More information about the openssl-users
mailing list