*   Server can distinguish the client and alter some parameters in response 
to make the new connection successful.
A TLS server would typically choose either server-preferred parameters (cipher 
suite, EC curve, etc.) among those advertised by the client, or honor the 
client’s preferences.
Can you give some examples of what a TLS server would alter, to make the new 
connection successful, assuming the 2nd ClientHello has the same list of 
options as the 1st one?
Basically, what types of interop failures is this cookie intended to resolve?


  *   Modern real-life applications (e.g. browsers) may perform several 
handshakes in a row until the connection to the server is finally rejected.
Some TLS clients will vary their offered TLS parameters between these 
connection attempts.

Cheers,

Andrei

From: TLS <tls-boun...@ietf.org> On Behalf Of Dmitry Belyavsky
Sent: Friday, September 16, 2022 4:32 AM
To: TLS Mailing List <tls@ietf.org>
Subject: [EXTERNAL] [TLS] Opt-in schema for client identification

Dear colleagues,

I'd like to suggest an opt-in cookie-style schema allowing the server to 
identify the client in case when a client performs several unsuccessful 
connection attempts.

Modern real-life applications (e.g. browsers) may perform several handshakes in 
a row until the connection to the server is finally rejected. It may make sense 
to provide different handshake parameters on the server side on the consequent 
attempts.

To distinguish the same client from several different clients, it may be useful 
to add a cookie-style extension in ClientHello. The server responds with an 
encrypted extension containing a random value in a ServerHello. If the 
connection fails, a client may send a value received from the server in the 
next connection attempt. Server can distinguish the client and alter some 
parameters in response to make the new connection successful.

The schema differs from the current session/tickets mechanism because the 
current mechanism implies session resumption only for successfully completed 
handshakes.

As the schema is opt-in, it doesn't provide any extra surveillance 
opportunities.

I understand that the proposed schema may badly work with CDNs.

If there is an interest to my proposal, I could draft it and present on the 
upcoming IETF meeting.

--
SY, Dmitry Belyavsky
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to