Re: [TLS] Removing restriction on cross-domain resumption

2017-09-22 Thread Jeffrey Walton
On Fri, Sep 22, 2017 at 9:15 PM, Martin Thomson wrote: > On Fri, Sep 15, 2017 at 8:42 AM, Jeffrey Walton wrote: >> The current models uses origins as a boundary, so they are different >> security contexts. > > That's not relevant here. A certificate allows a server to speak for > multiple origin

Re: [TLS] Removing restriction on cross-domain resumption

2017-09-22 Thread Martin Thomson
On Fri, Sep 15, 2017 at 8:42 AM, Jeffrey Walton wrote: > The current models uses origins as a boundary, so they are different > security contexts. That's not relevant here. A certificate allows a server to speak for multiple origins. The notion of an origin is, as you say, established at a high

Re: [TLS] Removing restriction on cross-domain resumption

2017-09-14 Thread David Benjamin
On Thu, Sep 14, 2017 at 6:42 PM Jeffrey Walton wrote: > To play devil's advocate, will the TLS stack need to keep a copy of > the certificate or authorized origins (an origin group?) for future > connections? Implementations that don't retain enough information for it can always just not offer

Re: [TLS] Removing restriction on cross-domain resumption

2017-09-14 Thread Jeffrey Walton
On Wed, Sep 13, 2017 at 5:57 PM, Victor Vasiliev wrote: > Currently, TLS 1.3 specification forbids resuming the session if SNI values > do not match. This is inefficient in multiple cases, for example, if you > have a wildcard domain cert, and the user is likely to visit multiple > subdomains ove