On Wed, May 03, 2017 at 01:19:35PM -0700, Colm MacCárthaigh wrote:
> On Wed, May 3, 2017 at 12:35 PM, Nico Williams <n...@cryptonector.com>
> wrote:
> > No, please don't remove the obfuscated ticket age.  Either make it
> > encrypted or leave it as-is.
> 
> If it is to be encrypted, say AEAD'd, it needs to be encrypted under a key
> that the client and server share; because the client needs to modify the
> age before sending. Moving the age to its own message, post Client-Hello,
> could solve that - so it comes out of the ticket.

Naturally.  That's why we have ticket session keys.

> That scheme is a bit weird and circular: the server would have to "use" the
> ticket to derive a key that decrypts the age, to then decide if it should
> "really use" the ticket for 0-RTT data. That seems pretty convoluted to me
> - could be a fairly complicated security proof.

It's what Kerberos has been doing for decades.  RFC4120 (before that
RFC1510).

> > Type 2.1 - Ticket intended for 0-RTT, does include the ticket age (maybe
> > > not in the ticket itself, but somewhere in the handshake), can only be
> > used
> > > once.
> >
> > No.  Give advice.  Do not remove these features.
> 
> I think the can only be used once for 0-RTT needs to be firm. Otherwise
> 0-RTT mode is insecure.

I don't agree: the application may not care.

> > > Type 2.2 - Same as 2.1, but required to be smaller than RPSK in size, to
> > > prevent self-encryption.
> >
> > I don't grok this.
> >
> 
> Self-encrypting tickets require STEKs and all of their problems. [...]

Can you elaborate?  (I don't follow TLS WG that closely.  I'm from
KITTEN WG.)

Nico
-- 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to