On Wed, Jul 4, 2018 at 6:27 AM, Hubert Kario <hka...@redhat.com> wrote:

> On Wednesday, 4 July 2018 15:06:27 CEST Ilari Liusvaara wrote:
> > On Wed, Jul 04, 2018 at 02:42:51PM +0200, Hubert Kario wrote:
> > > All the implementations I deal with in my day-to-day work fail to
> handle
> > > the 0-RTT client hello correctly when the 0-RTT support is not enabled
> on
> > > the server.
> > >
> > > I.e. they ignore the MUST clause from
> > > https://tools.ietf.org/html/draft-ietf-tls-tls13-28#page-58 stating
> that
> > > the server can handle an early_data extension (and following encrypted
> > > data) in only one of three ways, neither which allows for unconditional
> > > connection abort.
> > >
> > > This also runs afoul the recommendation from
> https://tools.ietf.org/html/
> > > draft-ietf-tls-tls13-28#section-D.3 on 0-RTT backwards compatibility.
> >
> > OTOH, such servers probably do not send out tickets allowing 0-RTT, so
> > any client attempting 0-RTT with such server is very broken.
>
> please read Section D.3, it is spelled out in detail there why that's not
> the
> case
>
>
> the short of it: the client has no way of knowing if it is connecting to
> the
> same server/instance/process it received the ticket from
>

That's true if you have some kind of mixed rollout, but if you never
supported
0-RTT, then there is something wrong with the client.

-Ekr


> --
> Regards,
> Hubert Kario
> Senior Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to