On 16. mai 2017 20:59, Eric Rescorla wrote: >> However, this intuition is incorrect. Alerts signal the end-of-use of >> keys, not the prohibition of further communication under other keys. >> Keys should be deleted and no further data should be sent on the >> connection. > > This last sentence seems to reinforce the motivating intuition here, > namely that the alert signals the end of the *connection*, and so it's > odd to have EOED indicate a key change within a connection. > Avoiding getting caught on the word "connection", EOED signals the end of key use like other alerts, which is the central issue. Notably, EOED does not signal key change, unlike a KeyUpdate message or Finished message - even the name indicates that it is for "end of data". Its behavior is fundamentally like an alert's, indicating only end-of-key use for application data.
>> Specifically, the 0-RTT handshake is >> followed by 0-RTT data and finally an EndOfEarlyData alert to end use of >> that key, while in parallel the remainder of the handshake and >> subsequent session key act almost as a further resumption (i.e. under a >> different key). >> > I can see how you could look at it this way, but I'm not sure that that's > the natural way to look at it. If you're not doing DH, then these are > very much derived from the same PSK and the same client-side > nonce. > In that case, they are both then related to the master key of the previous session, which may well have ended with a close_notify, i.e. a properly finished key use signaled by an alert.
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls