There has been previous discusson about the number of session tickets.
This discussion needs to be revisited, as the request to update the
document was rejected for erroneous reasons.

RFC 8446 Section C.4 gives guidance on this exact issue:  How many
session tickets should be used for an application which uses TLS.

https://tools.ietf.org/html/rfc8446#appendix-C.4

   Servers that issue tickets SHOULD offer at least as many tickets as
   the number of connections that a client might use; for example, a web
   browser using HTTP/1.1 [RFC7230] might open six connections to a
   server.  Servers SHOULD issue new tickets with every connection.
   This ensures that clients are always able to use a new ticket when
   creating a new connection.

EAP-TLS will only be using one connection.  There is no way to use
multiple EAP "connections" over the same media.  As such, RFC 8446
suggests that only one session ticket is appropriate.

The recommendation to use one session ticket by EAP-TLS does not
require checking with the TLS WG, because this use-case was already
anticipated, and explictly permitted by them.  This recommendation is
not making recommendations about TLS 1.3 internals, and no supporting
evidence was given for that claim.  This recommendation does not make
EAP-TLS incompatible with TLS implementations, and there was no
supporting evidence given for that claim, either.

Both RFC 8446 as a standard, and OpenSSL (as an example
implementation) permit an application to change the number of session
tickets used by TLS.  This change uses public APIs in a manner
permitted by the specifications, in the same way that many other
protocols use TLS.  The opposite position dismisses a technical
position based experience with implementation and deployments.  That
position is contrary to the publicly available specifications and
implementations.

Off-list discussion among the implementors indicates that there is
consensus to send, and store, only one session ticket.  There is
consensus that EAP peers will only ever use one session ticket at a
time.

It would be beneficial to have the document reflect EAP-TLS as
implemented.  It would be beneficial to have the document reflect the
recommendations of RFC 8446.

I suggest therefore that the draft be updated to reference RFC 8446
Section C.4 in respect to this topic.  Also, that the draft require
the EAP server sends only one session ticket.  And that the EAP peer
expect only one session ticket.  And that if more than one session
ticket is received by the EAP peer, that it chooses to save one and
discards the rest.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to