On Mon, Sep 26, 2016 at 4:09 PM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:
>
> There are other ways to accomplish this.  For example, the server might
> use session ticket keys that are stored centrally encrypted under a
> suitable escrow key.  If clients always enable session tickets, then
> every handshake will result in the server returning a session ticket,
> in which case the session can be later decrypted if the session ticket
> keys are available.
>

This actually doesn't work in TLS 1.3 because the resumption master secret
is not sufficient to decrypt the connection in which it was established.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to