On Sun, Jul 9, 2017 at 9:34 AM, Benjamin Kaduk <bka...@akamai.com> wrote:
> On 07/09/2017 08:33 AM, Eric Rescorla wrote:
>
>
>
>
> Also, it considers Section 7.4.1.4 of RFC 5246, i.e. the same extensions
>> SHOULD be included in case of request for session resumption.
>>
>> This also led to the design in the draft (i.e., the HMAC computed by the
>> client and the provisioning of a session key K_S), so that the client does
>> not require to contact the TA again in case of intended session resumption.
>>
>
> It seems like if this is really important, the TA could just give the
> client some small
> number of tokens on initial contact.
>
>
> I wonder if the desired properties could be obtained by having the TA be a
> Kerberos KDC that only issues [Kerberos tickets targetting the TLS server's
> Kerberos principal] to [Kerberos clients that are authorized to speak TLS
> to the TLS server].  Then the TLS extension could just hold a Kerberos
> authenticator that binds to the client random and the client can reuse the
> kerberos ticket until it expires.
>

It's actually not clear to me why this needs to be bound to the CH at all,
for the reasons I indicated in my review....

-Ekr


> -Ben
>
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to