On Mon, Jan 28, 2019 at 10:04 PM Subodh Iyengar <sub...@fb.com> wrote:
>
> > Since clients already store tickets, could they not also store the
> time of original ticket issuance and cap the resumption window to N
> (7) days from that point? That is, it seems clients could implement
> this behavior without any protocol support.
>
> Correct, however the server currently provides a value for this, and clients 
> do not enforce a lower bound on this. 7 days is an upper bound.
> Servers would provide a much lower value than 7 days practically.
>
> If I'm understanding your suggestion correctly, you're suggesting that 
> clients change the meaning of ticket_lifetime_hint?
> That is not just limit it to the scope of the ticket but the entire TLS 
> session? That would be fine to by me, however might break some folks.

If by "entire TLS session" you mean the resumed (and renewed)
sessions, then yep!

Best,
Chris

>
> Subodh
> ________________________________
> From: Christopher Wood <christopherwoo...@gmail.com>
> Sent: Monday, January 28, 2019 9:57 PM
> To: Subodh Iyengar
> Cc: tls@ietf.org
> Subject: Re: [TLS] ticket lifetimes
>
> On Mon, Jan 28, 2019 at 9:43 PM Subodh Iyengar <sub...@fb.com> wrote:
> >
> > In TLS 1.3 we added a maximum age to the ticket lifetime to be 7 days. This 
> > had several original motivations including reducing the time that a ticket 
> > is reused (for privacy or PFS). Another major motivation for this was to 
> > limit the exposure of servers that use keyless ssl like mechanisms, i.e. if 
> > they kept a STEK locally, but the keyless SSL server remotely, then the 
> > theft of a STEK would presumably limit the MITM capabilities to the ticket 
> > lifetime.
> >
> > However thinking about it some more because of the renewal capability of 
> > tickets in TLS 1.3, an entity owning the STEK could just re-issue new 
> > tickets forever on a resumed connection. This would look to the client as a 
> > new ticket and it would refresh its lifetime on the ticket. Thereby a MITM 
> > could intercept connections to users that have been to the server with the 
> > STEK. I'm wondering whether it might be useful to define a mechanism to 
> > limit the lifetime of all ticket resumption across all resumptions from the 
> > original connection instead of just the limited per ticket lifetime.
>
> Since clients already store tickets, could they not also store the
> time of original ticket issuance and cap the resumption window to N
> (7) days from that point? That is, it seems clients could implement
> this behavior without any protocol support.
>
> Best,
> Chris

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to