I've been reviewing this issue because I want to help figure out how to do
token binding over TLS 1.3 PKS 0-RTT.  When the server emulates a session
cache, then the RMS is unique on every PSK 0-RTT resumption.  That means
the client handshake hash is also unique, and it therefore becomes an
attractive value for the purpose of signing.  If we allow client auth in
this mode, we gain some security.  In particular, without access to the
client cert private key, an attacker cannot resume a session, even if they
have the RMS.

Give this possible mode of operation, we may want to consider keeping
client auth as an option in 0-RTT PSK resumption.

Bill
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to