IETF conflict review for draft-sheffer-tls-pinning-ticket
conflict-review-sheffer-tls-pinning-ticket-01

Document Conflict review draft-sheffer-tls-pinning-ticket-12 ISE stream
Last updated 2019-06-17
State Approved No Problem - announcement sent
IESG Shepherding AD Benjamin Kaduk
Telechat date (None)
Send notices to Adrian Farrel <rfc-ise@rfc-editor.org>, draft-sheffer-tls-pinning-ticket@ietf.org

Conflict review
draft-sheffer-tls-pinning-ticket-12

   
The IESG has concluded that this work is related to IETF work done in the
TLS WG ,but this relationship does not prevent publishing.

Additionally, the IESG requests the following note be added to the document if
it is published:

The cryptographic construction used in this document to derive a
pinning_protection_key from an existing resumption_protection_key (e.g., one
that is shared across a cluster of servers authoritative for the same domain)
reuses the same long-term cryptographic key for both bulk encryption (of TLS
session tickets) and as the PRK input to HMAC [RFC2104] via the HKDF-Expand()
[RFC5689] construction.  This reuse of key material without an intermediate
derivation step has not undergone extensive cryptanalysis and may introduce
unforseen weaknesses for both the original session-ticket encryption usage
[RFC5077] and the new usage proposed in this document.