*   - processing of invalid session ID, if it is repeated in the 2nd attempt, 
can be omitted using a smaller cache on the server side
Invalid session ID should not lead to handshake failure; it results in a full 
handshake and an updated session ID/ticket.


  *   - a server having more than one valid certificate for the domain name, 
can switch between them in various attempts.
Sure, but arguably TLS has reasonable methods for driving certificate 
selection, in terms of signature/hash suites.


  *   A cleartext correlator between different requests like this would also be 
a privacy concern and seems to run counter to the work in RFC 8446, appendix 
C.4.
Correct. I'm trying to see what the use-case would be, regardless of the 
proposed design.

From: Dmitry Belyavsky <beld...@gmail.com>
Sent: Friday, September 16, 2022 12:01 PM
To: David Benjamin <david...@chromium.org>
Cc: Andrei Popov <andrei.po...@microsoft.com>; TLS Mailing List <tls@ietf.org>
Subject: Re: [TLS] [EXTERNAL] Opt-in schema for client identification

>From the top of my head I can imagine 2 sort of real-life scenarios:

- processing of invalid session ID, if it is repeated in the 2nd attempt, can 
be omitted using a smaller cache on the server side
- a server having more than one valid certificate for the domain name, can 
switch between them in various attempts.

I agree with Andrei that other parameters are chosen either according to client 
or to the server preferences.

On Fri, Sep 16, 2022 at 8:53 PM David Benjamin 
<david...@chromium.org<mailto:david...@chromium.org>> wrote:
I too am not seeing the use case here. Could you elaborate?

Since browsers were mentioned as an example, when Chrome makes several 
connections in a row (e.g. to measure impacts of a removal more accurately), we 
generally do not expect the server to change its selection algorithm across the 
two connections. A cleartext correlator between different requests like this 
would also be a privacy concern and seems to run counter to the work in RFC 
8446, appendix C.4.

On Fri, Sep 16, 2022 at 10:09 AM Andrei Popov 
<Andrei.Popov=40microsoft....@dmarc.ietf.org<mailto:40microsoft....@dmarc.ietf.org>>
 wrote:

  *   Server can distinguish the client and alter some parameters in response 
to make the new connection successful.
A TLS server would typically choose either server-preferred parameters (cipher 
suite, EC curve, etc.) among those advertised by the client, or honor the 
client's preferences.
Can you give some examples of what a TLS server would alter, to make the new 
connection successful, assuming the 2nd ClientHello has the same list of 
options as the 1st one?
Basically, what types of interop failures is this cookie intended to resolve?


  *   Modern real-life applications (e.g. browsers) may perform several 
handshakes in a row until the connection to the server is finally rejected.
Some TLS clients will vary their offered TLS parameters between these 
connection attempts.

Cheers,

Andrei

From: TLS <tls-boun...@ietf.org<mailto:tls-boun...@ietf.org>> On Behalf Of 
Dmitry Belyavsky
Sent: Friday, September 16, 2022 4:32 AM
To: TLS Mailing List <tls@ietf.org<mailto:tls@ietf.org>>
Subject: [EXTERNAL] [TLS] Opt-in schema for client identification

Dear colleagues,

I'd like to suggest an opt-in cookie-style schema allowing the server to 
identify the client in case when a client performs several unsuccessful 
connection attempts.

Modern real-life applications (e.g. browsers) may perform several handshakes in 
a row until the connection to the server is finally rejected. It may make sense 
to provide different handshake parameters on the server side on the consequent 
attempts.

To distinguish the same client from several different clients, it may be useful 
to add a cookie-style extension in ClientHello. The server responds with an 
encrypted extension containing a random value in a ServerHello. If the 
connection fails, a client may send a value received from the server in the 
next connection attempt. Server can distinguish the client and alter some 
parameters in response to make the new connection successful.

The schema differs from the current session/tickets mechanism because the 
current mechanism implies session resumption only for successfully completed 
handshakes.

As the schema is opt-in, it doesn't provide any extra surveillance 
opportunities.

I understand that the proposed schema may badly work with CDNs.

If there is an interest to my proposal, I could draft it and present on the 
upcoming IETF meeting.

--
SY, Dmitry Belyavsky
_______________________________________________
TLS mailing list
TLS@ietf.org<mailto:TLS@ietf.org>
https://www.ietf.org/mailman/listinfo/tls<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftls&data=05%7C01%7CAndrei.Popov%40microsoft.com%7C38aed490bde840d9809d08da98165079%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637989518872154364%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=W7wN3D%2F1eKzp2An8BR4laCg9a%2Bmi8UnsonV04c3rL3k%3D&reserved=0>


--
SY, Dmitry Belyavsky
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to