Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tighten TLS1.2 Session Ticket lifetimes #5147

Open
maddeleine opened this issue Feb 26, 2025 · 0 comments
Open

Tighten TLS1.2 Session Ticket lifetimes #5147

maddeleine opened this issue Feb 26, 2025 · 0 comments

Comments

@maddeleine
Copy link
Contributor

maddeleine commented Feb 26, 2025

Security issue notifications

If you discover a potential security issue in s2n we ask that you notify
AWS Security via our vulnerability reporting page. Please do not create a public github issue.

Problem:

A s2n-tls server currently sends a new session ticket in a resumed handshake if the STEK used to encrypt the ticket is in decrypt-only mode. This is in the original resumption RFC, however it seems like a bad idea in general, because it allows the original session to live longer. I recommend removing the code that creates a new session ticket in a resumed handshake.
See:
https://datatracker.ietf.org/doc/html/rfc5077#section-3.1

If the server successfully verifies the client's ticket, then it MAY
renew the ticket by including a NewSessionTicket handshake message
after the ServerHello in the abbreviated handshake.

Recommended Solution:

Stop sending session tickets in resumed handshakes in TLS1.2.
Note that we technically could remove some handshakes from our state machine with this change, although that would not be required.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants