Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Text on session resumption #3566

Merged
merged 5 commits into from
Apr 21, 2020
Merged

Text on session resumption #3566

merged 5 commits into from
Apr 21, 2020

Conversation

martinthomson
Copy link
Member

In looking at #3028, I realized that we had nowhere that addressed the basic concept of resumption. This is, I hope, all that we need to say on the subject. It talks about state and then the privacy implications of using resumption.

I found less in the TLS 1.3 RFC on this subject than I might have liked to see. It only really addressed ticket reuse. So this is a little more verbose than is ideal.

Oh, and there are new requirements here, but as they are restatements of existing requirements, I don't think that this needs to be a design change. But I will happily switch to treating this as a design issue if anyone asks.

Closes #3028.

In looking at #3028, I realized that we had nowhere that addressed the
basic concept of resumption.  This is, I hope, all that we need to say
on the subject.  It talks about state and then the privacy implications
of using resumption.

I found less in the TLS 1.3 RFC on this subject than I might have liked
to see.  It only really addressed ticket reuse.  So this is a little
more verbose than is ideal.

Closes #3028.
@martinthomson martinthomson added editorial An issue that does not affect the design of the protocol; does not require consensus. -tls labels Apr 8, 2020
Copy link
Contributor

@huitema huitema left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As I said in the text comment, this is good. Only open question is whether there should be a "privacy consideration" note in the security section.

Client SHOULD NOT reuse tickets as that allows entities other than the server
to correlate connection; see Section C.4 of {{!TLS13}}.


Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Simple and to the point. My only reservation is about the security section. Session resumption allows tracking by the server, and this is arguably a security issue. The text here properly describes the concern and the remediation, but I wonder whether should there be a mention of these potential privacy issues in the security section.

draft-ietf-quic-tls.md Outdated Show resolved Hide resolved
draft-ietf-quic-tls.md Show resolved Hide resolved
Co-Authored-By: ianswett <ianswett@users.noreply.github.com>
draft-ietf-quic-tls.md Outdated Show resolved Hide resolved
Co-Authored-By: Mike Bishop <mbishop@evequefou.be>
@martinthomson martinthomson merged commit bdbfb41 into master Apr 21, 2020
@martinthomson martinthomson deleted the resumption branch April 21, 2020 22:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
-tls editorial An issue that does not affect the design of the protocol; does not require consensus.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Requiring per application data in session ticket seems wrong
5 participants