-
-
Notifications
You must be signed in to change notification settings - Fork 662
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
set tls.sessionIdContext property #1740
Conversation
Current coverage is 34.47% (diff: 12.50%)@@ master #1740 diff @@
==========================================
Files 23 23
Lines 5919 5917 -2
Methods 761 762 +1
Messages 0 0
Branches 1503 1500 -3
==========================================
Hits 2040 2040
+ Misses 3879 3877 -2
Partials 0 0
|
Am I right in thinking that this will not fix #1739 if running with nodes=cpus because if the reconnection happens to a different child (which is likely), then the secureContext will be different? |
Close, but not quite. Ya see, the root of the problem is You are very right to be thinking that the secureContext would best be shared among processes, but if not, or if a client presents a ticket that's not found in the secureContext, that's no big deal as the server will check the context and if missing, create a new ticket. It works almost exactly the same way if you set the sessionTimeout to something really low like 1 second. The TLS ticket ends up being expired after every connection. |
One of the best explanations is on the OpenSSL users list: |
Late at night, after all them Thunderbird users are gone to sleep, I snuck in and changed to nodes=4 (having 16 children is just kinda silly) and tested again, just to make sure. I sent a half dozen messages through unhindered. Previously (w/o patch) I could send the first and subsequent attempts (until restarting Thunderbird) would fail. |
This reverts commit 2f9dbb6.
This reverts commit 2f9dbb6. This is causing some issues: With the latest haraka we get errors like "Error: 140025275811648:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:../deps/openssl/openssl/ssl/s23_clnt.c:769:" when using old code.
Fixes #1739
Changes proposed in this pull request:
_getSecureContext()
secureOptions | constants.SSL_OP_NO_SSLv2 | constants.SSL_OP_NO_SSLv3
Checklist: