On Tue, May 16, 2017 at 2:10 PM, Britta Hale <britta.h...@ntnu.no> wrote:

>
> On 16. mai 2017 20:59, Eric Rescorla wrote:
>
> However, this intuition is incorrect. Alerts signal the end-of-use of
> keys, not the prohibition of further communication under other keys.
> Keys should be deleted and no further data should be sent on the
> connection.
>
> This last sentence seems to reinforce the motivating intuition here,
> namely that the alert signals the end of the *connection*, and so it's
> odd to have EOED indicate a key change within a connection.
>
>
> Avoiding getting caught on the word "connection", EOED signals the end of key
> use like other alerts, which is the central issue. Notably, EOED does
> not signal key change, unlike a KeyUpdate message or Finished message - even
> the name indicates that it is for "end of data". Its behavior is fundamentally
> like an alert's, indicating only end-of-key use for application data.
>
>
I'm not sure why you say it doesn't signal a key change: EOED signals the
transition
between data encrypted with the early traffic keys and that encrypted with
the handshake
key.


> Specifically, the 0-RTT handshake is
> followed by 0-RTT data and finally an EndOfEarlyData alert to end use of
> that key, while in parallel the remainder of the handshake and
> subsequent session key act almost as a further resumption (i.e. under a
> different key).
>
>
> I can see how you could look at it this way, but I'm not sure that that's
> the natural way to look at it. If you're not doing DH, then these are
> very much derived from the same PSK and the same client-side
> nonce.
>
>
> In that case, they are both then related to the master key of the previous
> session, which may well have ended with a close_notify, i.e. a properly
> finished key use signaled by an alert.
>
> Yes, that's true, but I'm not sure I see the relevance of this point.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to