Skip to content

crypto/tls: cap lifetime of authentication in TLS 1.3 #77294

@FiloSottile

Description

@FiloSottile

In TLS 1.3, session resumptions rotate the key material, so we have been willing to let chains of resumptions go on unlimitedly.

@rbqvq pointed out in private, in #77217, and in CL 738761 that it might still be desirable to force the peer to periodically prove control over the certificate's private key.

As @rbqvq reports BoringSSL has such a cap, and nginx applies it also when using OpenSSL (which instead has the same behavior as we do openssl/openssl#19341).

It'd probably make sense to match BoringSSL here.

Metadata

Metadata

Assignees

No one assigned

    Labels

    LibraryProposalIssues describing a requested change to the Go standard library or x/ libraries, but not to a toolNeedsFixThe path to resolution is known, but the work has not been done.

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions