On Tue, Feb 23, 2016 at 09:42:17AM -0800, Nick Sullivan wrote:

> Draft 11 currently supports both ServerConfiguration and PSK + Session
> Ticket for session resumption (0RTT or otherwise). Both mechanisms have the
> same properties in terms of forward secrecy: a compromise of the server's
> private data (whether PSK, session ticket key, or DH exponent) lets an
> attacker retroactively decrypt data from all sessions established with the
> PSK or Session Ticket. However, both mechanisms contain different language
> around how the lifetimes of the resumption data is managed.
> 
> After some discussion with Facebook and others, I'd like to suggest a
> change in the wording of the draft to make the Session Ticket lifetime more
> closely resemble the lifetime of the ServerConfiguration.

IMHO the analogy between ServerConfiguration and SessionTicket is
a flawed one.  ServerConfiguration is created by the server
unilaterally, at some time before the client connection and is not
session-specific.  The client has no implicit knowledge of the
ServerConfiguration age.

The situation is completely different with SessionTicket, which is
created as a side-effect of the *current* handshake, and is always
fresh when created.  A SessionTicket lifetime hint that is a relative
time is therefore quite sufficient and avoids clock synchronization
and epoch time wrap-around problems.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to