>From the top of my head I can imagine 2 sort of real-life scenarios:

- processing of invalid session ID, if it is repeated in the 2nd attempt,
can be omitted using a smaller cache on the server side
- a server having more than one valid certificate for the domain name, can
switch between them in various attempts.

I agree with Andrei that other parameters are chosen either according to
client or to the server preferences.

On Fri, Sep 16, 2022 at 8:53 PM David Benjamin <david...@chromium.org>
wrote:

> I too am not seeing the use case here. Could you elaborate?
>
> Since browsers were mentioned as an example, when Chrome makes several
> connections in a row (e.g. to measure impacts of a removal more
> accurately), we generally do *not* expect the server to change its
> selection algorithm across the two connections. A cleartext correlator
> between different requests like this would also be a privacy concern and
> seems to run counter to the work in RFC 8446, appendix C.4.
>
> On Fri, Sep 16, 2022 at 10:09 AM Andrei Popov <Andrei.Popov=
> 40microsoft....@dmarc.ietf.org> wrote:
>
>>
>>    - Server can distinguish the client and alter some parameters in
>>    response to make the new connection successful.
>>
>> A TLS server would typically choose either server-preferred parameters
>> (cipher suite, EC curve, etc.) among those advertised by the client, or
>> honor the client’s preferences.
>>
>> Can you give some examples of what a TLS server would alter, to make the
>> new connection successful, assuming the 2nd ClientHello has the same list
>> of options as the 1st one?
>>
>> Basically, what types of interop failures is this cookie intended to
>> resolve?
>>
>>
>>
>>    - Modern real-life applications (e.g. browsers) may perform
>>    several handshakes in a row until the connection to the server is finally
>>    rejected.
>>
>> Some TLS clients will vary their offered TLS parameters between these
>> connection attempts.
>>
>>
>>
>> Cheers,
>>
>>
>>
>> Andrei
>>
>>
>>
>> *From:* TLS <tls-boun...@ietf.org> *On Behalf Of * Dmitry Belyavsky
>> *Sent:* Friday, September 16, 2022 4:32 AM
>> *To:* TLS Mailing List <tls@ietf.org>
>> *Subject:* [EXTERNAL] [TLS] Opt-in schema for client identification
>>
>>
>>
>> Dear colleagues,
>>
>>
>>
>> I'd like to suggest an opt-in cookie-style schema allowing the server to
>> identify the client in case when a client performs several unsuccessful
>> connection attempts.
>>
>>
>>
>> Modern real-life applications (e.g. browsers) may perform
>> several handshakes in a row until the connection to the server is finally
>> rejected. It may make sense to provide different handshake parameters on
>> the server side on the consequent attempts.
>>
>>
>>
>> To distinguish the same client from several different clients, it may be
>> useful to add a cookie-style extension in ClientHello. The server responds
>> with an encrypted extension containing a random value in a ServerHello. If
>> the connection fails, a client may send a value received from the server in
>> the next connection attempt. Server can distinguish the client and alter
>> some parameters in response to make the new connection successful.
>>
>>
>>
>> The schema differs from the current session/tickets mechanism because the
>> current mechanism implies session resumption only for successfully
>> completed handshakes.
>>
>>
>>
>> As the schema is opt-in, it doesn't provide any extra surveillance
>> opportunities.
>>
>>
>>
>> I understand that the proposed schema may badly work with CDNs.
>>
>>
>>
>> If there is an interest to my proposal, I could draft it and present on
>> the upcoming IETF meeting.
>>
>>
>>
>> --
>>
>> SY, Dmitry Belyavsky
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>>
>

-- 
SY, Dmitry Belyavsky
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to