Hi Rifaat,

I'm obviously excited to see people encrypting massive amounts of traffic,
but I did want to pressure test this use case a bit.

I have two questions:

1. What's the mean time between failure of these connections?
2. What do you do if the connection fails? Do you have some way to cleanly
restart?

Thanks,
-Ekr



On Fri, Jun 20, 2025 at 5:31 PM Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com>
wrote:

> We have a use case where optical systems establish a persistent TLS
> channel that is then used to mint keys used to encrypt massive amounts of
> traffic over fiber optic lines.
> This mechanism could be useful to allow the systems to maintain that TLS
> channel during certificate rotation, without tearing down the connection.
>
> Regards,
>  Rifaat
>
>
> On Fri, Jun 20, 2025 at 6:55 PM Yaroslav Rosomakho <yrosomakho=
> 40zscaler....@dmarc.ietf.org> wrote:
>
>> I don't believe certificates expire just because of key compromise. Hosts
>> could be decommissioned, domains could be repossessed, services could move
>> around. Certificate Update provides assurance that the peer still has the
>> right to claim original identity.
>> Let's say an IoT device established a session with a vendor server to
>> stream sensitive diagnostic data. The vendor could change server hosting
>> provider, update DNS records but forget to shut down the previous instance.
>> Established connections will stay up though the server effectively lost its
>> identity. Sadly, these things do happen in the wild.
>>
>> As of key compromise, there are two separate risks:
>> - compromised private key of certificate
>> - compromised session key
>>
>> A Certificate with a potentially compromised private key needs to be
>> revoked and replaced with a fresh one. However, rekey of the session (Key
>> Update or Extended Key Update) does not bring assurance that the connection
>> is established with the correct peer - it could well be an imposter in
>> possession of a stolen private key. Certificate Update provides that
>> assurance.
>>
>> Extended Key Update is about reducing risks associated with the
>> compromised session key.
>>
>> Best Regards,
>> Yaroslav
>>
>> On Fri, Jun 20, 2025 at 11:29 PM Watson Ladd <watsonbl...@gmail.com>
>> wrote:
>>
>>> On Fri, Jun 20, 2025 at 3:20 PM Yaroslav Rosomakho
>>> <yrosoma...@zscaler.com> wrote:
>>> >
>>> > Hello Watson,
>>> >
>>> > On Fri, Jun 20, 2025 at 10:50 PM Watson Ladd <watsonbl...@gmail.com>
>>> wrote:
>>> >>
>>> >>
>>> >> What exactly is the rationale here? Do we expect that identies
>>> >> actually change when a certificate expires?
>>> >
>>> >
>>> > Certificate confirms identity information for a certain period of
>>> validity as long as it is not revoked. Communication with an endpoint that
>>> produces a revoked or expired certificate is deemed to have unacceptable
>>> risk and typically denied. However, this risk applies to established
>>> sessions in exactly the same way as it applies to new sessions. The
>>> rationale is to ensure that the peer identity is still valid by the time
>>> the original certificate expired or got revoked.
>>>
>>> Certificate expiry is in some sense driven by the risk of key
>>> compromise. If the key is compromised it fails to provide assurance as
>>> to the identity of the counterparty. But that compromise could also
>>> happen to the keys protecting the session over that length of time
>>> (yes, there are some differences in threat model depending on how they
>>> are stored). In that case this draft doesn't actually protect
>>> anything: an attacker with those keys is able to see the traffic going
>>> through and continue to exploit the session.
>>>
>>> This isn't really a problem of identities expering (how could they)
>>> but rather risk limitation.
>>>
>>> The reason I belabor this point is the conclusion: we have to rekey
>>> the connection as well to get the assurances we want. The mechanism
>>> here doesn't do that.
>>>
>>> >
>>> > TLS 1.2 and prior could perform re-key and re-authentication through
>>> rehandshake. As the very generic rehandshake carried unacceptable security
>>> risks it was removed in TLS 1.3. Extended Key Update brings back re-key in
>>> a secure way. Similarly, Certificate Update proposal is intended to bring
>>> back re-authentication in a very limited controlled fashion.
>>> >
>>> > Best Regards,
>>> > Yaroslav
>>> >
>>> >
>>> > This communication (including any attachments) is intended for the
>>> sole use of the intended recipient and may contain confidential,
>>> non-public, and/or privileged material. Use, distribution, or reproduction
>>> of this communication by unintended recipients is not authorized. If you
>>> received this communication in error, please immediately notify the sender
>>> and then delete all copies of this communication from your system.
>>>
>>>
>>>
>>> --
>>> Astra mortemque praestare gradatim
>>>
>>
>>
>> This communication (including any attachments) is intended for the sole
>> use of the intended recipient and may contain confidential, non-public,
>> and/or privileged material. Use, distribution, or reproduction of this 
>> communication
>> by unintended recipients is not authorized. If you received this
>> communication in error, please immediately notify the sender and then delete
>> all copies of this communication from your system.
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to