Hi,

Reading "Using EAP-TLS with TLS 1.3" I find the text potentially
misleading when it comes to resumption within TLS 1.3, specifically
for the case where the peer wishes to re-validate the certificate
originally provided by the server during the initial handshake using
only its locally cached data and without redoing the handshake, e.g.
to determine that the original certificate hasn't expired or been
revoked.


5.7.  Resumption
   ...
   To perform resumption in a secure way, the EAP-TLS peer and
   EAP-TLS server need to be able to securely retrieve authorization
   information such as certificate chains from the initial full
   handshake.
   ...
   There are two ways to retrieve the cached information from the
   original full handshake.
   ...
   The second method for retrieving cached information is
   via [RFC5077] or [RFC8446], where the TLS server encapsulates the
   information into a ticket and sends it to the client.  The client can
   subsequently do resumption using the obtained ticket.  Note that the
   client still needs to cache the information locally.


In TLS 1.3, the PSK ticket is defined as being encrypted using a key
that only the server knows. Even without encryption, the format for
the ticket is opaque to the client with only a suggested format
presented in RFC 8446.

How is the original handshake data determined? A casual reading of the
text seems to imply that the client performs some verification using
the encapsulated information within the ticket.

However I believe that the intent is to use the full PSK blob, or some
digest thereof, as a key to lookup the corresponding cached handshake
data.

Perhaps this could be made clearer?


Thanks,

Terry

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to