>    The (mis)use of long-term STEKs is not particularly special among such 
> practices.

This may be true, but that still doesn’t make it a good idea. We should 
probably do *something* about this. J

>    The protocol design should avoid setting traps for the unwary.    
>    If libraries implement "long-term" STEKs, that's a library bug, not a 
> protocol issue.

Seems to me that both points are valid and not mutually exclusive. Why don’t we 
capture this discussion in the RFC itself? We often provide guidance/alerts for 
implementers. Why should this be different? Such a warning would presumably 
prevent it from being a trap for the unwary (or unweary, depending on how much 
rest they’ve gotten) without requiring a change to the protocol itself. 

We could even go so far as to add a “SHOULD NOT” around using STEKs that are 
long-lived? That would provide a strong hint to implementers but leave 
flexibility for those who need different behavior and understand the risks?

Cheers,

Tim
—
Tim Jackson | Product Security Architect | MobileIron, Inc.

On 5/3/17, 11:29 AM, "Nico Williams" <n...@cryptonector.com> wrote:

    On Wed, May 03, 2017 at 12:10:12PM -0400, Viktor Dukhovni wrote:
    > > On May 3, 2017, at 12:01 PM, Salz, Rich <rs...@akamai.com> wrote:
    > > The protocol design should avoid setting traps for the unwary.
    > 
    > No, that responsibility falls on libraries.  STEKs are not a trap for the
    > unweary.  Libraries that support static session tickets by default can be
    > viewed as such a trap.  So the onus to fix this is on us (OpenSSL team)
    > not the TLS protocol.
    
    A big +1 to this.
    
    I think it would terrible if we couldn't have resumption at all because
    one common implementation mishandles old key deletion.
    
    Nico
    -- 
    
    _______________________________________________
    TLS mailing list
    TLS@ietf.org
    https://www.ietf.org/mailman/listinfo/tls
    

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to