> There is not relation whatsoever between the transport
 > channel (TCP, hosts,
 > ports or whatever) and the TLS protocol (being transported in
 > the channel).
 > The case you are describing is not uncommon. I have a dialup
 > provider that
 > will give me a dynamic (and hence changing) IP number
 > whenever build up
 > a new connection. That does not stop me from re-using my TLS-sessions.
 >
 > Remark: the default timeout of SSL sessions in OpenSSL and in several
 > OpenSSL based WWW-servers like mod_ssl is 300s=5min, so you
 > have to switch
 > your IPs fast :-). My Postfix/TLS extension for the
 > Postfix-MTA defaults
 > to 3600s=1h, so that this situation occurs more often.

A question along those same lines...

What specifically causes a browser to request the same session?  And what 
causes it to request a new session (session-ID = 0)?  Can one know with 
certainty whether a browser will attempt to resume a session?

TIA

Chad

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to