That's only because there is some chance that the ticket binds in more
contextual information.  In practice, this might also happen as a
result of application-layer changes.  At the TLS layer, it's hard to
know exactly why the new ticket was issued.  If it was just adding
another ticket to the pile of available tickets, or whether it
replaced previous tickets.  As the consequences of using an invalid
ticket aren't serious, I would suggest that you simply use the most
recent one.  If you only use each ticket once, then use the most
recent one and hope that it's still current.

As ekr says, the old ticket isn't invalid from the perspective of TLS.
That only happens at the expiration time, and as the server decides.
You know the former, and can only guess at the latter.

On Fri, Mar 16, 2018 at 4:36 PM, Eric Rescorla <e...@rtfm.com> wrote:
> On Fri, Mar 16, 2018 at 4:19 PM, Matt Caswell <m...@openssl.org> wrote:
>>
>> What is reasonable behaviour for a client to do with any tickets it has
>> previously received following a key update or a post-handshake
>> authentication? Should those old tickets be now considered out-of-date
>> and not used?
>
>
> There is no good reason to discard tickets received post KeyUpdate. The
> KeyUpdate
> has no impact on their security.
>
> It's probably reasonable to discard tickets received after Post-Handshake
> Auth if a new
> ticket is received, as that ticket might incorporate the client's
> authenticated identity. Otherwise
> I wouldn't bother.
>
> -Ekr
>
>>
>> Matt
>>
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to