[openssl-users] disable session id reuse

Devang Kubavat digant.kubavat at gmail.com
Sun May 6 08:11:46 UTC 2018


Hi Darshan, 

In Addition, Make sure that you should disable the session ticket based session resumption using SSL_OP_NO_TICKET. 

By default SSL_OP_NO_TICKET is not disabled. 

Thanks
Devang
Sent from my iPhone

> On 03-May-2018, at 2:12 PM, Mody, Darshan (Darshan) <darshanmody at avaya.com> wrote:
> 
> Hi,
>  
> While doing a openssl s_time command I find that by default it tries for Session Id Reuse. “Now timing with session id reuse.”
>  
> In case if we don’t want openssl to reuse session id’s how can we configure openssl in the application for the same.
>  
> The application here is acting as a server.
>  
> I have set  SSL_CTX_set_session_cache_mode to SSL_SESS_CACHE_OFF
>  
> Thanks
> Darshan
> -- 
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20180506/57a56724/attachment-0001.html>


More information about the openssl-users mailing list