Re: [TLS] One stream to rule them all (was Re: Security review of TLS1.3 0-RTT)

2017-05-03 Thread Colm MacCárthaigh
On Wed, May 3, 2017 at 7:31 PM, Martin Thomson wrote: > A clear delineation of security properties exists, if the handshake is > done, then you are in the clear. Otherwise, beware. The separation > of the streams doesn't help if you consider the possibility that 0-RTT > data can be retroactivel

Re: [TLS] One stream to rule them all (was Re: Security review of TLS1.3 0-RTT)

2017-05-03 Thread Martin Thomson
On 4 May 2017 at 12:29, Salz, Rich wrote: > That's kind of inflammatory. Apology accepted :) Yep, a bit stronger than ideal, sorry. > I don't want to make things hard. I want to make them clear and merging > two sets of data with different security properties does not seem like it's > help

Re: [TLS] One stream to rule them all (was Re: Security review of TLS1.3 0-RTT)

2017-05-03 Thread Salz, Rich
> Because doing anything else makes it a lot harder for the application. > > I realize that you *want* that, but clearly we disagree about the > utility of API hurdles. Given that the application already took > extraordinary steps to enable 0-RTT, we don't think that adding > artificial hurd

Re: [TLS] One stream to rule them all (was Re: Security review of TLS1.3 0-RTT)

2017-05-03 Thread Martin Thomson
On 4 May 2017 at 11:41, Benjamin Kaduk wrote: > A related question is whether NSS wants to be a general-purpose TLS library, > or an HTTP-specific TLS library. I have mostly come to terms with the HTTP > application profile for 0-RTT saying "combine the streams" (but still want > to see it writte

Re: [TLS] One stream to rule them all (was Re: Security review of TLS1.3 0-RTT)

2017-05-03 Thread Benjamin Kaduk
On 05/03/2017 08:35 PM, Martin Thomson wrote: > On 4 May 2017 at 11:31, Salz, Rich wrote: >> Well, for example, Chrome/boringSSL should arguably know better but are >> treating it all as one equivalent stream. >> >> Is FF/NSS doing the same thing? > Yes. > >> Why? > Because doing anything else ma