You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It seems like we're only using the .SessionTicketsDisabled field from the initial tls.Config, but we should perhaps be using the field from the tls.Config we get for a specific client if we have tls.Config.GetConfigForClient set. This would allow the server to support session tickets generally, but disable them for certain clients.
That said, I'm not sure if that's actually useful though. So it might also be okay if this wasn't supported.
I took a quick look at what would be required to change this, and I'm not sure it would be easy. The tls.Config for a specific client seems internal to crypto/tls.
The text was updated successfully, but these errors were encountered:
You're right. The only "clean" option would be wrapping GetConfigForClient and keeping track of which config is actually in use, which would add a lot of complexity.
This check should probably be performed inside the standard library, and I've opened golang/go#62032 for that.
For now, quic-go can do an error assertion, so this error doesn't end up closing the connection.
It seems like we're only using the
.SessionTicketsDisabled
field from the initial tls.Config, but we should perhaps be using the field from the tls.Config we get for a specific client if we have tls.Config.GetConfigForClient set. This would allow the server to support session tickets generally, but disable them for certain clients.That said, I'm not sure if that's actually useful though. So it might also be okay if this wasn't supported.
I took a quick look at what would be required to change this, and I'm not sure it would be easy. The tls.Config for a specific client seems internal to
crypto/tls
.The text was updated successfully, but these errors were encountered: