> On May 3, 2017, at 8:45 AM, Colm MacCárthaigh <c...@allcosts.net> wrote:
> 
> The fundamental problem with STEKs is that there is no forward secrecy

Sorry, STEKs are not long-term keys.  So it makes little sense to claim
that use of STEKs breaks forward secrecy.  Indeed STEKs may be more safe
than server-side storage of complete sessions, since the latter are much
more likely to end up on disk.

It is a shared meme that session tickets break forward secrecy, but it is
not correct.  Poorly implemented session ticket keys can be a problem, but
so can poorly implemented session caches.

The distributed single-use caches you are imagining are very complex beasts,
and I am much less inclined to trust those than a comparatively simple key
rollover system (just three keys need to be known at any time, the past key
for as yet unexpired sessions, the current key used to mint and decrypt
new sessions and the future key created shortly before the current key becomes
the past key, giving enough time for all the cluster nodes to get a copy).

The time window for session compromise is never zero, after all, the keys
are in memory while the connection is active.  It is unwise to insist that
forward-secrecy is broken if session keys are not destroyed instantaneously
at session closure.  A reasonably short non-zero window of exposure may yield
greater security benefit than a design which appears to be more secure by
attempting synchronous destruction of keys at much greater overall design
complexity.

-- 
-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to