Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Query: Scandium DTLS session timeout #24

Closed
kiranpradeep opened this issue Mar 20, 2016 · 2 comments
Closed

Query: Scandium DTLS session timeout #24

kiranpradeep opened this issue Mar 20, 2016 · 2 comments

Comments

@kiranpradeep
Copy link

The LeastRecentlyUsedCache used for saving connections have an expiration threshold of 36 hours. I assume this implies if a client sleeps for more than 36 hours and then wakes to send a data packet, it would be discarded and client will need to reconnect. I tried a quick incomplete read of the RFC 6347 and couldn't find points about a need for session timeout.

Is this session timeout mandatory. Why are not we letting the session stay for ever until LRU capacity is reached? Or is my understanding wrong ? Kindly let me know if this query has to go to a mailing list.

@sbernard31
Copy link
Contributor

The TLS 1.2 spec say:
"An upper limit of 24 hours is suggested for
session ID lifetimes, since an attacker who obtains a master_secret
may be able to impersonate the compromised party until the
corresponding session ID is retired."

By the way we should maybe set it to 24 by default.

I suppose you already see that but you can configure the threshold with an adapted value for your use case. setExpirationThreshold
If you don't want expiration (not really recommended ;)) you could implement your own ConnectionStore.

About the mailing list vs github issue:
Mailing list is more for asking questions (like this one)
github issue to report bugs (or request enhancement)

@kiranpradeep
Copy link
Author

@sbernard31 Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants