Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 40442 invoked from network); 5 Jul 2005 17:41:47 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 5 Jul 2005 17:41:47 -0000 Received: (qmail 11722 invoked by uid 500); 5 Jul 2005 17:41:39 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 11680 invoked by uid 500); 5 Jul 2005 17:41:39 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 11667 invoked by uid 99); 5 Jul 2005 17:41:39 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 05 Jul 2005 10:41:39 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (asf.osuosl.org: local policy) Received: from [216.255.199.145] (HELO utopia.in.force-elite.com) (216.255.199.145) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 05 Jul 2005 10:41:39 -0700 X-AuthUser: chip@force-elite.com Received: from [10.0.0.41] (10.0.0.41:3219) by utopia.in.force-elite.com with [XMail 1.17 (Linux/Ix86) ESMTP Server] id for from ; Tue, 05 Jul 2005 10:41:34 -0700 Message-ID: <42CAC65E.1050909@force-elite.com> Date: Tue, 05 Jul 2005 10:41:50 -0700 From: Paul Querna User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317) X-Accept-Language: en-us, en MIME-Version: 1.0 To: dev@httpd.apache.org Subject: Re: [PATCH] Allow for internal OpenSSL Session Cache References: <3891F9F6-A04B-44ED-BA3D-AD5EA3E97577@jaguNET.com> In-Reply-To: <3891F9F6-A04B-44ED-BA3D-AD5EA3E97577@jaguNET.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N Jim Jagielski wrote: > I've run into this with some "broken" browsers. Basically, they > require a non-null SessionID in the SSL transaction. If, for whatever > reason, we disable the external SSL Session Cache, these > browsers reports errors when connecting to the SSL vhost. > > This adds a new argument to SSLSessionCache which says "disable any > external session cache, but use OpenSSL's internal one" which makes > OpenSSL send the SessionID parameter again. > How about "internal" instead of "justinternal"? I assume this session cache is local to the SSL Context? Any browser which requires an SSL Session to work is quite broken. Do you have a list of browsers that we could add to the documentation?