On Wed, Jan 22, 2020 at 05:12:34PM -0800, Watson Ladd wrote: > > - either the TLS server says "here's a ticket and you MUST or MAY > > replace the one you already had" > > > > or > > > > - the TLS client gets to ask for no unnecessary new tickets > > > > Now the first alternative would be infeasible to adopt because it would > > require new OpenSSL callback APIs, and anyways would be a more invasive > > change to TLS than the ticketrequest extension makes. > > Nothing says you have to remember tickets, so unless I'm missing > something the semantics already are the second one.
I want to use tickets for resumption, so naturally I have to remember them. I also don't actually get to directly see the tickets, rather OpenSSL invokes a "new_session_cb" callback after updating the current session with newly received tickets. Since I have a shared cache, I have to perform the work of storing the updated sesion, so that other SMTP delivery agents get to see the new ticket. I can't just ignore the ticket, since the reason for the new ticket may be that the old one has expired, either after some period of reuse, or because the server only ever issues single-use tickets. The deployed base of Postfix servers issues multi-use tickets (always, there's no extension to tell me otherwise), and sends zero tickets on resumption, so I need to not just throw away tickets that are still valid. -- Viktor. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls