Skip to content

Commit

Permalink
Merge pull request #902 from ekr/issue871_ticket_lifetime
Browse files Browse the repository at this point in the history
Warn about eternal ticket extension. Fixes #871
  • Loading branch information
ekr authored Mar 8, 2017
2 parents 1713bce + 92a7b1a commit ed35996
Showing 1 changed file with 9 additions and 2 deletions.
11 changes: 9 additions & 2 deletions draft-ietf-tls-tls13.md
Original file line number Diff line number Diff line change
Expand Up @@ -3321,7 +3321,6 @@ ticket_lifetime
for a shorter period of time than what is stated in the
ticket_lifetime.


ticket_age_add
: A securely generated, random 32-bit value that is used to obscure the age of
the ticket that the client includes in the "pre_shared_key" extension.
Expand All @@ -3334,7 +3333,6 @@ The ticket itself is an opaque label. It MAY either be a database
lookup key or a self-encrypted and self-authenticated value. Section
4 of {{RFC5077}} describes a recommended ticket construction mechanism.


extensions
: A set of extension values for the ticket. The "Extension"
format is defined in {{extensions}}. Clients MUST ignore
Expand All @@ -3353,6 +3351,15 @@ max_early_data_size
SHOULD terminate the connection with an "unexpected_message" alert.
{:br }

Note that in principle it is possible to continue issuing new tickets
which continue to indefinitely extend the lifetime of the keying
material originally derived from an initial non-PSK handshake (which
was most likely tied to the peer's certificate). It is RECOMMENDED
that implementations place limits on the total lifetime of such keying
material; these limits should take into account the lifetime of the
peer's certificate, the likelihood of intervening revocation,
and the time since the peer's online CertificateVerify signature.

### Post-Handshake Authentication

The server is permitted to request client authentication at any time
Expand Down

0 comments on commit ed35996

Please sign in to comment.