On Sat, Nov 20, 2021 at 10:57:01AM +0000, John Mattsson wrote:

> I expect most TLS stacks to happily continue the connection after
> external PSK (I think those do not even have standard expiry
> times) or certificate expires.
> 
> John: Yes, and I think they should. The application has the
> responsibility of External PSKs. I think TLS should just provide an
> alert (and an API) so that the application can signal to the other
> endpoint why it closed the connection. Reusing certificate_expiry
> seems like a good idea for external PSK.

Ticket lifetimes are short so that servers can cycle through keys more
often, improving forward secrecy.  They can legitimately certainly have
much shorter lifetimetimes than the sessions established by using the
tickets.  There is no realistic threat model in which keeping a session
alive past ticket expiration has particular security relevance.

The only thing that matters is what reasonable lifetime to impose
sessions, which has no connection with either certificate or ticket
lifetimes.

-- 
    Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to