On Fri, Mar 25, 2016 at 8:33 AM, Bill Cox <waywardg...@google.com> wrote:

> Adding 1 byte EarlyDataType seems like a good idea.
>
> As for the CipherSuite, assuming DH-0RTT goes away, would it be simpler to
> require that the cipher suite negotiated from the original 1-RTT connection
> be used?
>
> For channel binding, the only mode that seems to work with 0-RTT is when
> we issue new tickets on each 0-RTT connection to emulate a single session
> like we have in TLS 1.2, and use a replay cache on the server.  The only
> valid proof-of-possession the server can do with the client before
> processing application requests is the one done on the 1-RTT connection, so
> this single proof needs to secure the entire chain of 0-RTT connections.
> The master resumption secret becomes a bearer token and needs to be
> protected accordingly.
>
> The Export Key Material API also needs to be updated.  The simplest
> implementation where keys are derived from the current ephemeral secrets
> will cause the exported keys to be different whenever new keys are
> negotiated.  This will probably cause bugs at the application layer.  We
> may need to have an EKM API that depends only on the original PSK, and
> another one for generating ephemeral EKM material.
>

PTAL at draft-12 which has a definition of exporters based on the Exporter
Secret, which is computed at the end of the handshake.

-Ekr




>
>
> Bill
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to