On Feb 6, 2021, at 12:33 AM, John Mattsson <john.mattsson=40ericsson....@dmarc.ietf.org> wrote: > I made several updates to the text based on your comments.
I'll go through GitHub to figure out what those were... > My earlier comments on the early ticket was wrong, it is not a bug. The > ticket in OpenSSL is still valid but the server does cannot calculate the PSK > before it has received the client Finished. OK, that's good. > All message flows are correct. There is no single way how TLS 1.3 works. It > is completely up to the implementation. The server can send 0 or 20 tickets. > It can send them together with the server Finished, or in one or more > separate flights. The document should explain this in detail, and suggest which message flows are preferred, and which ones MUST be supported. It should explain what happens when resumption is negotiated, and 20 tickets are received by the peer. What does that mean? What does the peer do with them? Why does the server send them? Which (if any) ticket is preferred? It is not helpful if a specification says "anything can happen". The purpose of the specification is to provide a guide for implementors and deployments. This includes not just saying what *can* happen. But what *should* happen. Why one thing is preferred over another. Why certain protocol choices were made. So that readers of the document are informed as to what to do, and why they need to do it. > I updated the draft to make it clear that all the message flows are examples. > Some of the figure texts appeared like there was only one way the message > flow could look like, which is basically never the case in TLS 1.3. > > I removed the text in the draft on pre-computation of PSK. That is covered in > RFC 8446. I added text stating that the NewSessionTicket can be sent with the > server Finished or later so that does not come as a suprise. > > I updated the resumption to send the NewSessionTicket together with Finished. > The draft now gives examples of NewSessionTicket in the first server flight > and NewSessionTicket in the second server flight. I have some minor feedback, mostly nits: ... In the case where EAP-TLS server authentication is unsuccessful and the EAP-TLS peer sends a TLS Error alert, the conversation will appear as shown in What does it mean to say "will" appear? SHOULD the conversation look like that? MUST it? What happens when the conversation doesn't appear like that? What does it mean when the conversation doesn't appear like that? I recognize that the "will appear" text is taken from RFC 5216 and therefore isn't new. But given the discussion in the working group, some additional explanation would help implementors. Further, there are significantly more variants of TLS 1.3 flows than for TLS 1.2. These variants should be explained, along with suggestions and recommendations. What does an EAP peer do if it receives 20 session tickets? Why would a server send 20 session tickets? Perhaps simply recommend that if possible, only one session ticket be sent by the EAP server. And that if the EAP peer receives multiple session tickets, it should only save one, and discard the rest. Which one doesn't matter. If the EAP server sends multiple session tickets, it's the responsibility of the EAP server to ensure that all are valid. ... To enable resumption when using EAP-TLS with TLS 1.3, the EAP-TLS server MUST send one or more Post-Handshake NewSessionTicket messages I suggest limiting this to one. I suggest also saying that session tickets SHOULD NOT be sent BEFORE the client cert is validated. But that perhaps this is not always under the control of the EAP layer. And, that the EAP peer MUST ignore session tickets until after it has received the "altSuccess" message from the EAP server. Further, the EAP server MUST NOT cache or use any session tickets sent by the TLS layer before the client certificate is validated. ... The Post-Handshake NewSessionTicket message can be sent in the same flight as the TLS server Finished or later. What does it mean if the NewSessionTicket message is sent later? Is there an impact on the number of round trips? What is the RECOMMENDED approach? Perhaps the NewSessionTicket message SHOULD be sent in the same EAP packet as the TLS Server Finished message. Sending it later adds additional round trips for no benefit. ... decscribed in <xref target="RFC3748"/> and Section 5.5 of <xref target="RFC5216"/>, the only information that is integrity and replay protected in EAP-TLS are the parts of the TLS Data that TLS protects Typo: "described" I would suggest adding text to note the the TLS alerts and close_notify are encrypted by the TLS layer, and therefore meet the security and privacy requirements of altAccept and altReject of RFC 4137. Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu