On Wed, Feb 13, 2019 at 7:37 PM Roelof DuToit <r@nerd.ninja> wrote:

> Questions for PR [1]:
>
> * Regarding this text:
> The client MUST NOT use the server-provided retry keys until the handshake
> completes successfully. On success, it MUST NOT overwrite the DNS-provided
> keys with the retry keys. It MUST use the retry keys at most once and
> continue offering DNS-provided keys for subsequent connections. This avoids
> introducing a tracking vector, should a malicious server present
> client-specific retry keys.
>
> .. specifically this part: ".. use the retry keys at most once".
> Q1: Are you saying the client should persistently remember which
> public_name values triggered retry keys?  For how long?
>

No, exactly the opposite. You use the retry key for just the retry and then
forget about it.
https://mailarchive.ietf.org/arch/msg/tls/xBEHe1_CcYEYinZQHxWGq8vjA0Q

Q2: What happens if fronting server A sent retry keys, and the subsequent
> transport connection ends up on server B, which also sends retry keys?
>

You keep retrying. And hen you hit the text which says:

> Clients SHOULD implement a limit on retries caused by
"esni_retry_request" or
> servers which do not acknowledge the "encrypted_server_name" extension.

This is an error-correcting mechanism to avoid deployment risks. If your
TLS deployment is so out of sync with itself that:

- It deployed ESNI keys in the DNS that your servers do not understand.
- Even on a retry to presumably the same IP address, you hit a different
server node.
- Your load balancer keeps bouncing between different server nodes
connections right after each other.
- Each of your server nodes believes in a totally disjoint set of ESNI keys..

Then I think giving up and failing the connection is not the end of the
world.



>
> --Roelof
>
>
> ---- On Wed, 13 Feb 2019 17:15:57 -0500 *Christopher Wood
> <christopherwoo...@gmail.com <christopherwoo...@gmail.com>>* wrote ----
>
> Hi folks,
>
> PRs [1] and [2] need a little more review before we merge since
> they’re non-trivial changes. Please have a look and let the list know
> if you have objections with the contents therein. Otherwise, we will
> merge them by the end of the next week.
>
> Thanks!
> Chris (no hat)
>
> [1] https://github..com/tlswg/draft-ietf-tls-esni/pull/124
> <https://github.com/tlswg/draft-ietf-tls-esni/pull/124>
>
> [2] https://github.com/tlswg/draft-ietf-tls-esni/pull/125
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to