On Sun, Jul 19, 2015 at 05:28:27PM -0400, Brian Smith wrote:

> Thus, because of that
> possibility, it is valuable to have the client be able to say "don't cache
> the session" and/or limit the session's lifetime, so the client can help
> direct the level of forward secrecy for the session. Right now, only the
> server has a say in how long a session will be forward-secret.

I think this is too much complexity, for too little gain.  Servers
will limit the lifetime of local session storage rather severely
to avoid running out of space.

> Note also that the NewSessionTicket extension precedes any application
> data, so without a way to prevent an unwanted NewSessionTicket message from
> being sent, the client has to waste effort and time to consume the
> NewSessionTicket before it can do anything useful.

This is typically much smaller than the server certificate chain,
so the cost saving is marginal.

> Anyway, I don't understand why you keep directing your question to server
> vendors. The people that would be interested in such a feature are client
> software vendors, for client software that wants to control the level of
> forward secrecy for a session.

I don't think the client would gain much if any control by signalling
a lifetime hint.  With actual session tickets, the key rotation
lifecycle determines the effective forward-secrecy exposure (to
server state compromise before a key is retired) of the ticket,
and no client hint can influence that in any way.

So I agree with Eric that the issue is fundamentally a server-side
issue, modulo the fact that the CPU and bandwidth cost of processing
the unwanted ticket is borne on both sides.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to