On Tue, Jul 12, 2016 at 8:34 AM, Bill Cox <waywardg...@google.com> wrote:

> IIRC, in TLS 1.2 the same keys are used after resumption, and EKM values
> do not change.
>

In TLS 1.2, the EKM == MS but the exporter includes the randoms:

           PRF(SecurityParameters.master_secret, label,
               SecurityParameters.client_random +
               SecurityParameters.server_random +
               context_value_length + context_value
               )[length]

This means that if you resume, you should get different exported values.

-Ekr



I think most applications currently using EKM will break if the EKM values
> change after a PSK resume.
>
> However, forcing TLS 1.3 to remember a 256-bit EKM seed will bloat tickets
> by 32 bytes, and complicate the state machine.  I think this could
> partially be addressed by enhancing the custom extension APIs found in
> popular TLS libraries to enable custom extensions to specify state that
> needs to be remembered on a resume.  That, in combination with requiring
> extensions to be sent and processed in order of extension number, could
> enable a lot of this complexity to be taken out of the main TLS code, and
> only connections that actually need such extensions would see the increase
> in ticket size.
>
> Could something like this could work well for channel binding?
>
> Bill
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to