Hi All

Any suggestion on the problem?

Thanks
Darshan

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Mody, Darshan (Darshan)
Sent: Sunday, May 6, 2018 7:28 PM
To: openssl-users@openssl.org
Subject: Re: [openssl-users] disable session id reuse

Hi

We do set SSL_CTX_set_options(ctx, SSL_OP_NO_TICKET); while initializing Context

Thanks
Darshan

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Devang Kubavat
Sent: Sunday, May 6, 2018 1:42 PM
To: openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Subject: Re: [openssl-users] disable session id reuse

Hi Darshan,

In Addition, Make sure that you should disable the session ticket based session 
resumption using SSL_OP_NO_TICKET.

By default SSL_OP_NO_TICKET is not disabled.

Thanks
Devang
Sent from my iPhone

On 03-May-2018, at 2:12 PM, Mody, Darshan (Darshan) 
<darshanm...@avaya.com<mailto:darshanm...@avaya.com>> wrote:
Hi,

While doing a openssl s_time command I find that by default it tries for 
Session Id Reuse. “Now timing with session id reuse.”

In case if we don’t want openssl to reuse session id’s how can we configure 
openssl in the application for the same.

The application here is acting as a server.

I have set  SSL_CTX_set_session_cache_mode to SSL_SESS_CACHE_OFF

Thanks
Darshan
--
openssl-users mailing list
To unsubscribe: 
https://mta.openssl.org/mailman/listinfo/openssl-users<https://urldefense.proofpoint.com/v2/url?u=https-3A__mta.openssl.org_mailman_listinfo_openssl-2Dusers&d=DwMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=bsEULbVnjelD7InzgsegHBEbtXzaIDagy9EuEhJrKfQ&m=6EwdsImPOhlHS6cQdur-UNtSfmU8P5PrY6_Yr_tCo2U&s=SJPsG8EXG55k4n7fzDiMayd1OUlyHCWP2JzifuoOKg0&e=>
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to