Hello,

While testing a TLS1.3 client implementation, I found an unexpected behavior. Specific sequence:
1. Client negotiates TLS1.3 with Server.
2. Server sends NST with a valid ticket.
3. Client reconnects to the same Server. The ClientHello contains both the `session_ticket` and `pre_shared_key` extensions. The value of the `psk_identity` is equal to the value of the `session_ticket`.

Is it ever valid for a client to populate both extensions with the same ticket value? Even if the client reconnects and lands on a different server node that only supports TLS1.2, resumption should fail because the protocol version should be included as part of the session state. The `session_ticket` extension data in this example is at least wasted data.

I did not see anything in the spec(neither 8446 2.2 nor 4.6.1) that explicitly disallows this. 2.2 contains “Both mechanisms are obsoleted in TLS 1.3.” when referring to `session_ticket` and `session_id` resumption, but that may not be clear enough.

-Steven
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to