Some quick comments below:

Alan DeKok wrote:

>So it's possible for a malicious client to get the ticket, and close the 
>connection without >sending a client cert.  Then, if the EAP server doesn't 
>destroy the ticket, the client can >reconnect.

The resumption_master_secret includes the client finished so the client in your 
handshake with client authentication should not be able to reconnect, if it can 
it is an OpenSSL bug. Alternatively the server did not ask for client 
authentication and it is ok that the client reconnects.

>The packet flows in Figure 2 of draft-14 shows only one exchange of session 
>tickets, not 2.

Looks to me that the Figure 2 of draft-14 provisions two tickets...?

                                                         EAP-Request/
                                                    EAP-Type=EAP-TLS
                                               (TLS NewSessionTicket,
                                                TLS NewSessionTicket,
                                 <--------          TLS close_notify)

Cheers,
John


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to