Gary E. Miller via devel writes:
> The C2S and S2C already get reused millions of times, what's a few more
> million?

Both keys should only ever be used by a single client/server pair.
These are symmetric keys, so whoever knows them can encrypt and decrypt
all messages that use them.  So sharing these keys among different
servers would imply trust between them and hopefully we can agree that
different pool servers are in no such relationship.

> But, as you said, the TLS "has" to be renogotiated, so that state is lost
> for the next request.

No, re-keyed -- you specifically want to avoid the TLS renegotiation or
even worse, reconnection.  The session itself stays open.  You could
conceivably just open another connection inside the same session as far
as TLS is concerned.  I don't know which of the two options is more
efficient.


Regards,
Achim.
-- 
+<[Q+ Matrix-12 WAVE#46+305 Neuron microQkb Andromeda XTk Blofeld]>+

Factory and User Sound Singles for Waldorf Q+, Q and microQ:
http://Synth.Stromeko.net/Downloads.html#WaldorfSounds

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to