On Nov 14, 2022, at 1:09 PM, Eric Rescorla <[email protected]> wrote:
>   I'd like to have a way to say "if you don't support session tickets, just 
> ignore them".
> 
> Again this text is not quite right because

  I think you're talking at cross purposes to the problem I'm trying to 
describe.

> Can you explain how you got into this posture? The only reason a client 
> should be sending session tickets is if it received one
> from the server.

  The problem isn't that.  The problem is long before the client tries to 
reconnect.  The problem is the client, not the server.  The problem is that the 
initial connection to the server is never successful.  It has nothing to do 
with other uses of PSKs.  It has nothing to do with clients sending anything to 
the server.

  The flow is this:

     Client connects to server.

     Client and server exchange TLS information.  They're both happy with 
everything.

     Server eventually sends a session ticket to the client.

     Client goes "OMFG" and hangs up.  No more TLS session.

     Repeat ad nauseam until server administrator (a) forbids the use of TLS 
1.3, or (b) forbids session tickets.


  Windows 11 is doing this today with TLS-based EAP methods.  It's a disaster.

  Hence my text "if the client gets a session ticket, it is NOT a reason to 
tear down the TLS session".  The errata was filed explicitly against the text 
discussing the client, and discussing the clients behavior when it received 
session tickets.

  Again, from Section 4.6.1.:

  The client MAY use this PSK for future handshakes by including the
  ticket value in the "pre_shared_key" extension in its ClientHello

  and by *implication* the client also does not need to use the session ticket. 
 It is free to use the session ticket, or to ignore it entirely.

  What the client is *not* free to do is to treat the session ticket as a TLS 
connection failure.  This behavior can best be described as "surprising".

  Alan DeKok.

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to