On Wed, Jan 22, 2020 at 05:12:34PM -0800, Watson Ladd wrote:

> >  - either the TLS server says "here's a ticket and you MUST or MAY
> >    replace the one you already had"
> >
> >    or
> >
> >  - the TLS client gets to ask for no unnecessary new tickets
> >
> > Now the first alternative would be infeasible to adopt because it would
> > require new OpenSSL callback APIs, and anyways would be a more invasive
> > change to TLS than the ticketrequest extension makes.
> 
> Nothing says you have to remember tickets, so unless I'm missing
> something the semantics already are the second one.

I want to use tickets for resumption, so naturally I have to remember
them.  I also don't actually get to directly see the tickets, rather
OpenSSL invokes a "new_session_cb" callback after updating the current
session with newly received tickets.

Since I have a shared cache, I have to perform the work of storing the
updated sesion, so that other SMTP delivery agents get to see the new
ticket.

I can't just ignore the ticket, since the reason for the new ticket may
be that the old one has expired, either after some period of reuse, or
because the server only ever issues single-use tickets.

The deployed base of Postfix servers issues multi-use tickets (always,
there's no extension to tell me otherwise), and sends zero tickets
on resumption, so I need to not just throw away tickets that are
still valid.

-- 
    Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to