Replies: 1 comment 1 reply
-
There is a noticeable delay during the handshake phase. I tried to get it under 1 second using hardware acceleration. It is greatly depending on your certificate size. Using certificates with 4096 bits takes way longer than using certificates with 2048 bits. I'm looking forward for further optimization as I'd also like this delay to be reduced further. Once a session is established, there shouldn't be much delay on the transport socket and it should be approximately the same (minus some encryption / decryption time) as using plain text. As for the flow of Self-signed certificates, I know the TLS protocol specify specific flags to request client certificates, I mainly test the flow on Firefox and on a custom enterprise app. There might be existing issues with different clients with the current flow. If using self-signed certificates, you might need to import your CA into your client's chain of trusted CA to remove the self-signed error. |
Beta Was this translation helpful? Give feedback.
-
@ivmarkov @AnthonyGrondin A couple of questions about using esp-mbedtls as server.
I notice there is a pretty long delay from time of request to time of response on the connect phase. It's about a second or so. Is that expected? I guess that's the handshake, but with all hw acceleration with a single request is it expected to feel that noticable?
Regarding usage of self signed certificates.
On another device I have at home (NAS) it works in Chrome like in Firefox. Looks like the certificate there is isues by a CA (althoguh not for internal ip I use of course, and also revoked by now). Does it mean if I issue a CA signed certificate I can use it on the device and get a more reasonable experience on Chrome?
Is there a way to get a reasonable experience with https using self signed certificates somehow? Or they just block (even though initially showing as if it is in the users's control).
Beta Was this translation helpful? Give feedback.
All reactions