In TLS 1.3 we added a maximum age to the ticket lifetime to be 7 days. This had 
several original motivations including reducing the time that a ticket is 
reused (for privacy or PFS). Another major motivation for this was to limit the 
exposure of servers that use keyless ssl like mechanisms, i.e. if they kept a 
STEK locally, but the keyless SSL server remotely, then the theft of a STEK 
would presumably limit the MITM capabilities to the ticket lifetime.

However thinking about it some more because of the renewal capability of 
tickets in TLS 1.3, an entity owning the STEK could just re-issue new tickets 
forever on a resumed connection. This would look to the client as a new ticket 
and it would refresh its lifetime on the ticket. Thereby a MITM could intercept 
connections to users that have been to the server with the STEK. I'm wondering 
whether it might be useful to define a mechanism to limit the lifetime of all 
ticket resumption across all resumptions from the original connection instead 
of just the limited per ticket lifetime.

Subodh


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to