Hi Giang,

I think Robin tested it, so yes it works... But you need the bugfixes
he sent to the list...

Robin: Am I right?

Best regards
Michael

On Jan 20, 2009, at 5:59 PM, Giang Nguyen wrote:


I think I will go for the hack that misuses re-negotiation as a kind of
heartbeat, keep alive or echo request. I tried to avoid this hack at
first because it is a computational burden. AFAIK re-negotiation means restarting from scratch which means that expensive public key operations
have to be performed.

to avoid expensive full handshakes, what about using sessions?

from what i read at http://tools.ietf.org/html/rfc4347#section-3, "To the greatest extent possible, DTLS is identical to TLS."

and from what i read at http://tools.ietf.org/html/rfc5238 section 3.4: "multiple DTLS connections can be resumed from the same DTLS session, each running over its own DCCP connection."

so my assumption here is that DTLS supports abbreviated handshakes for session resumptions.

_________________________________________________________________
Windows Live™ Hotmail®: Chat. Store. Share. Do more with mail.
http://windowslive.com/explore?ocid=TXT_TAGLM_WL_t1_hm_justgotbetter_explore_012009______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to