OT: limit number of connections from browser to my server?
Grant Edwards
grant.b.edwards at gmail.com
Mon May 16 17:32:40 EDT 2016
On 2016-05-16, Paul Rubin <no.email at nospam.invalid> wrote:
> Grant Edwards <grant.b.edwards at gmail.com> writes:
>> I've actually got plenty of RAM. I just can't afford the CPU time
>> it takes to do the public-key crypto stuff that happens each time
>> an SSL connection starts up.
>
> I think you should only have to do that once, then use TLS session
> resumption for additional connections.
Thanks, I'll look into that -- I've seen the term before, but that's
about it.
Is it something the server tells the client to do?
And more to the point, will all popular browsers do it?
> There is also something called TLS-PSK in TLS 1.3. Do you mind
> saying the application, and what clients you have to support?
The application is something proprietary running on proprietary
hardware (32-bit ARM processor running a typical RTOS and a
BSD-derived network stack). The web server is a heavily modified
version of GoAhead 2.something.
I have to support the usual suspect list of browsers: IE, Firefox,
Chrome, Safari.
> What TLS stack are you using?
It's not an open-source one. Beyond that, I can't really say.
> There is generally also a way to configure browsers to limit the
> number of outgoing connections.
I can't ask the browser user to change settings.
> I'll probably be meeting with some TLS experts tomorrow night for
> unrelated reasons, so I can ask them about this if you want.
--
Grant Edwards grant.b.edwards Yow! I want you to MEMORIZE
at the collected poems of
gmail.com EDNA ST VINCENT MILLAY
... BACKWARDS!!
More information about the Python-list
mailing list