I believe that this is the right design.

The primary proposed use for EncryptedExtensions in the 0-RTT flight is for
EncryptedSNI. However, I don't believe that they are actually that useful in
this case because the design constraints for EncryptedSNI are intended to
allow the client to encrypt the SNI to a gateway but encrypt the traffic to
the hidden server, which means that you want the SNI to be protected with
gateway keys, not the terminal traffic keys.

This design still allows two fairly elegant EncryptedSNI designs:

- Stuff a self-encrypted value of the SNI into the ticket label (due to
Cedric
  Fournet).
- Establish a ticket to the gateway server and then encrypt the ClientHello
  that is destined for the hidden server in the 0-RTT early data flight to
the
  gateway, which deciphers it and passes it to the hidden server, which
  responds with the ServerHello (due to Martin Thomson)

Both of these are more flexible than SNI in EE.

Absent strong objections, I intend to merge this PR on Wednesday.
-Ekr






On Sun, Jun 26, 2016 at 6:33 PM, Martin Thomson <martin.thom...@gmail.com>
wrote:

> On 27 June 2016 at 02:34, Ilari Liusvaara <ilariliusva...@welho.com>
> wrote:
> > That's the reason it is XOR'd currently, but the XOR probably will
> > be changed to ADD32 to break correlation-to-parent (which is really
> > nasty privacy-wise) in case of ticket reuse.
>
> Let's not make that probably.  I've updated the PR.
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to