On Mon, Jul 19, 2021 at 4:20 PM Stephen Farrell <stephen.farr...@cs.tcd.ie> wrote:
> > Hiya, > > On 19/07/2021 17:50, David Benjamin wrote: > > Do you have other text in mind? There doesn't seem to be any other > possible > > answer here, since there is only one decision to make in resumption. > > There is a 3rd option: don't standardise the flag. That'd be > my preference, but as I said maybe I'm in the rough in not > preferring more optimisation at the cost of the additional > privacy concern. > > Other than that I don't have better wording to offer at the > moment that I think would really help sorry. Maybe if others > chime in something'll become more apparent. > I don't think that's an accurate characterization of what's going on. I at least care about both optimization and privacy. We should apply optimizations only where they do not result in a privacy issue, and we should not apply optimizations that result in a privacy issue. That means taking the time to understand a system's privacy goals and how mechanisms interact with them. Even ignoring this document, rfc8446 *already* fails this test. By omission, it implies applications needn't match up their privacy goals with TLS resumption. This is false and indeed that results in a tracking vector on the Web, and any other application where multiple contexts talk to the same domain. That means this 3rd option does not replace the need for text. We need to either find wording we're happy with, or remove resumption entirely. I've proposed some text for rfc8446bis. I think it captures the right criteria: you may only resume if you were okay correlating the first and second connections. If you think something is missing, I think that is useful feedback. Given how widespread resumption is, it's important that we fully understand the implications. https://github.com/tlswg/tls13-spec/pull/1205 >From there, we can look at this document. Observe that the rule applies equally well here. Moreover, on the Web, even after you apply the rule, there is still a space where the optimization is useful. This is great. It means we can both avoid a privacy issue *and* make things faster. Even better, the optimizations apply to XSS privsep schemes (subdomains within a site), so there is an indirect security benefit. Other applications may look different (no subresource-like construct, different correlation boundaries), such that the optimization is not useful, but that's still fine. The overall rule simply turns the flag into a no-op. David
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls