On Mon, Mar 14, 2016 at 7:25 PM, Martin Thomson <martin.thom...@gmail.com>
wrote:

> On 15 March 2016 at 13:22, Bill Cox <waywardg...@google.com> wrote:
> > In TLS 1.3, tickets are sent after the full handshake completes, after
> > encryption is enabled for the connection.  Now, if an attacker has the
> > ticket encryption key, it is not possible to decrypt old connections.  Is
> > that right?  It looks to me like tickets have real PFS in TLS 1.3.
>
>
> It's the properties of the session that matter here, not the tickets.
>
> The tickets are sent in the clear in the resumed handshake.
>

Right. As far as I can tell, that's required. TLS 1.3 PFS *is* much better
with
respect to tickets because the ticket established in connection N cannot
be used to decrypt that connection. In addition, because you can do
PSK-ECDHE,
you can confine the PFS risk to the 0-RTT data.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to