> On May 3, 2017, at 11:22 AM, Colm MacCárthaigh <c...@allcosts.net> wrote:
> 
> There's nothing enforcing that, and research has shown STEKs being used for 
> long periods of time.

That's an implementation defect.  Not a problem with STEKs as such.

In Postfix STEK lifetime == 2 * session lifetime (the latter defaults to 1 
hour).

Some time this year I'll introduce key rotation by default into OpenSSL, which
will result in short-term STEKs for all applications that don't implement 
session
ticket key management callbacks.  That way, it is not just applications that 
take
the time to handle key rotation that will get short-term STEKs. 

Mind you, long-lived servers such as Apache, Nginx, ... should also implement
key rotation via the relevant callback mechanisms and should not use static
keys.  Sloppy implementations are not a problem with STEKs, the same sloppy
implementations will just as likely have insecure caches.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to