On Tue, Jan 26, 2016 at 02:17:57PM +0000, Sara Dickinson via RT wrote:
> 
> > On 25 Jan 2016, at 18:42, Kurt Roeckx via RT <r...@openssl.org> wrote:
> > 
> > On Mon, Jan 25, 2016 at 06:24:55PM +0000, Sara Dickinson via RT wrote:
> >> Hi,
> >> 
> >> I would like to request that support be added to OpenSSL to enable client 
> >> applications to make use use of TCP Fast Open 
> >> (https://tools.ietf.org/html/rfc7413 
> >> <https://tools.ietf.org/html/rfc7413>) when initiating the TLS handshake 
> >> on Linux (TCP Fast Open is available in Linux kernel > 4.1). 
> > 
> > I've seen that request, and I have tought about it.  I'm just
> > wondering if that comes with security consequences, like replay
> > attacks.  
> 
> Not that I am aware of. I've seen the question of security vulnerabilities of 
> TFO raised a few times but never with any concrete examples, just 
> speculation. I've also observed Chromium using TFO with TLS.  

It's just that I've seen this speculation at other places, and
didn't understand it.

> I can take the question to the TCPM and/or TLS WG if that is helpful?

I don't think it's needed.


Kurt


_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to