The combination of DHE and TLS 1.3 session resumption via session tickets,
can destroy the forward secrecy property that DHE was intended to provide.
With the proposed removal of DHE-based 0-RTT from TLS 1.3, session
resumption is the mechanism by which 0-RTT connections are established.
When adopted into QUIC, this will then be a reduction in security as
compared with the current QUIC Crypto protocol, which rapidly steps all
connections up to having forward secrecy immediately after a 0-RTT
connection.

The 0-RTT connection is extremely desirable for use in QUIC, because of the
impact on connection latency, a known critical issues in all HTTP(S)
content acquisition.  Currently, at least 75% of all QUIC connections use
0-RTT, and then enjoy forward secrecy for the bulk of their communications.
I would like TLS 1.3 to provide similar forward-secrecy guarantees after a
0-RTT connection.

If a symmetric-session-ticket-decryption-key was compromised by a server,
as a result of a break-in, or a subpoena, then all traffic that depended on
the session resumption tickets would be at risk.  Moreover, a third party
attacker that possessed such a key, or planned to acquire a copy, could
"encourage" traffic to use session resumption by disrupting any connection.

A common use case involves having a large number of servers that must all
be equally able to resume a connection. As a result, encrypted session
tickets, protected by a server's symmetric secret key, are generally the
preferred mechanism for resumption.

Thanks for you consideration,

Jim Roskind
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to