Currently, TLS 1.3 specification forbids resuming the session if SNI values
do not match.  This is inefficient in multiple cases, for example, if you
have a wildcard domain cert, and the user is likely to visit multiple
subdomains over a longer timespan, so there is no existing connection to
pool on (or it's impossible to pool because of different IP addresses).

Last time we discussed this,
  https://www.ietf.org/mail-archive/web/tls/current/msg21655.html
no one has pointed out a good security reason why this should be
forbidden.  Also, the requirement as stated requires the server to enforce
it, while in reality, most implementations I am familiar with offload the
burden to the clients.

I wrote the following PR to remove the requirement:
  https://github.com/tlswg/tls13-spec/pull/1080
The PR still discourages clients to resume across domains by default (due
to likelihood of wasting a ticket which could have came in handy later), so
I'm currently writing a draft for an extension to inform clients that it's
okay to do that (it will be in spirit of PR #777
<https://github.com/tlswg/tls13-spec/pull/777>).

  -- Victor.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to