Welcome! Log In Create A New Profile

Advanced

Re: TLS session resumption (identifier)

B.R.
March 04, 2016 04:58AM
On Fri, Mar 4, 2016 at 10:33 AM, Igor Sysoev <igor@sysoev.ru> wrote:

> But still, advertising something without actually supporting it must lead
> to cases where sessions reuse is believed to take place without ever
> happening, harming performance... that was probably happening in versions <
> 1.5.9.
>
>
> I do not think that it should harm performance.
>

​Oh yes it does​... I am surprised by your stance and I beg to differ.
Having quite some load from many clients on a web-server delivering content
over HTTPS, it relieves a lot of pain to save CPU cycles by avoiding a full
handshake.
When a client browses a website, (s)he will initiate many connections.
Beyond the first one (ones with multiplexing?), session reuse kicks in.
Repeat that for each client and sum all the saved CPU cycles. Even an
improper (non-scientific) benchmark will show you improvement.

Session reuse is part of the effort of optimizing TLS trafic to minimize
its overhead. Have a talk about it with the W3C webperf group
https://www.w3.org/2010/webperf/ if you wish, to which Ilya Grigorik
(participated at nginxconf 2014) belongs. Have a look at his checklist
https://istlsfastyet.com/ too.​


> Giving the possibility to accomodate with Outlook (and Microsoft products
> in general) numerous quirks is fine, but making it the default is debatable…
>
>
> I believe this is safe default and clients should not rely on resumed
> sessions because
> 1) sessions have timeout defined by server security policy,
> 2) and server has limited session storage so old sessions are removed.
>

​Well, the mechanism behind TLS sessions is basically a trial-and-error​

​one.​ Even for tickets I would add, if the server changed its Master Key
between ticket creation and reuse.
There is little-to-no overhead at trying an expired session ID/ticket which
the client communicate in his initial message to the server. ID search in
cache or ticket invalidation requires few overhead resource and in case of
invalidation, normal protocol to initiate a new session resumes.

There is no guarantee a session exists, but there is everything to gain
from it if it does.​
---
*B. R.*
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
Subject Author Posted

TLS session resumption (identifier)

B.R. March 03, 2016 06:52AM

Re: TLS session resumption (identifier)

Maxim Dounin March 03, 2016 08:30AM

Re: TLS session resumption (identifier)

B.R. March 03, 2016 10:44AM

Re: TLS session resumption (identifier)

Igor Sysoev March 03, 2016 10:50AM

Re: TLS session resumption (identifier)

B.R. March 04, 2016 04:22AM

Re: TLS session resumption (identifier)

Igor Sysoev March 04, 2016 04:42AM

Re: TLS session resumption (identifier)

B.R. March 04, 2016 04:58AM

Re: TLS session resumption (identifier)

Igor Sysoev March 04, 2016 05:20AM

Re: TLS session resumption (identifier)

B.R. March 04, 2016 05:32AM

Re: TLS session resumption (identifier)

Igor Sysoev March 04, 2016 05:40AM



Sorry, only registered users may post in this forum.

Click here to login

Online Users

Guests: 88
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 421 on December 02, 2018
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready