You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add clarification that TLS session caching works with TLS 1.2 and 1.3
TLS session resumption is not limited to TLS 1.3. It works with both:
- TLS 1.2: Session IDs (RFC 5246) and Session Tickets (RFC 5077)
- TLS 1.3: Session Tickets (RFC 8446)
Python's ssl.SSLSession API handles both transparently, so no version
checks are needed. Added documentation and code comments to clarify this.
Co-authored-by: mykaul <[email protected]>
Copy file name to clipboardExpand all lines: TLS_TICKETS_DESIGN.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,12 +8,17 @@ This document describes the design and implementation of TLS session ticket supp
8
8
9
9
### What are TLS Session Tickets?
10
10
11
-
TLS session tickets (RFC 5077 and RFC 8446 for TLS 1.3) allow clients to cache session state and reuse it for subsequent connections. This provides:
11
+
TLS session tickets (RFC 5077 for TLS 1.2 and RFC 8446 for TLS 1.3) allow clients to cache session state and reuse it for subsequent connections. This provides:
12
12
13
13
-**Faster reconnections**: Reduced handshake latency by resuming previous sessions
14
14
-**Less CPU usage**: Fewer cryptographic operations during reconnection
15
15
-**Better performance**: Especially important for connection pools that frequently reconnect
16
16
17
+
**Note**: TLS session resumption works with both TLS 1.2 and TLS 1.3:
0 commit comments