On Fri, May 05, 2017 at 09:28:07AM -0700, Colm MacCárthaigh wrote:
> I wanted to start a separate thread on this, just to make some small
> aspects of replay mitigating clear, because I'd like to make a case for TLS
> providing a single-stream, which is what people seem to be doing anyway.
Coupl
What about when *part* of a request is in the 0RTT part, and the rest of it
isn’t? I believe this will happen often for H2 initial setup. Imagine the
“fun” when initial connection data, such as login cookies, is replayed in other
contexts and eventually decrypted?
--
Senior Architect, Akamai
On Sat, May 6, 2017 at 8:22 AM, Salz, Rich wrote:
>
> What about when **part** of a request is in the 0RTT part, and the rest
> of it isn’t? I believe this will happen often for H2 initial setup.
> Imagine the “fun” when initial connection data, such as login cookies, is
> replayed in other cont
On Sat, May 06, 2017 at 09:43:55AM -0400, Kyle Rose wrote:
> On Sat, May 6, 2017 at 8:22 AM, Salz, Rich wrote:
>
> >
> > What about when **part** of a request is in the 0RTT part, and the rest
> > of it isn’t? I believe this will happen often for H2 initial setup.
> > Imagine the “fun” when init
On Sat, May 6, 2017 at 11:12 AM, Ilari Liusvaara
wrote:
> On Sat, May 06, 2017 at 09:43:55AM -0400, Kyle Rose wrote:
> > I asked this question a while back, and didn't get a satisfying answer:
> if
> > an on-path attacker replaces the early data with a replay from an earlier
> > connection, does
On 5/4/2017 10:12 PM, Eric Rescorla wrote:
>
> Obligatory note that if clients are forbidden from reusing a single
> PSK for multiple 0-RTT, they can still use it for 1-RTT.
Yes, they can. But doing so leaks a unique identifier, which can be used
to link sessions. When I look at the privacy impl
On Sat, May 6, 2017 at 5:35 PM, Christian Huitema
wrote:
>
>
> On 5/4/2017 10:12 PM, Eric Rescorla wrote:
> >
> > Obligatory note that if clients are forbidden from reusing a single
> > PSK for multiple 0-RTT, they can still use it for 1-RTT.
>
> Yes, they can. But doing so leaks a unique identif
On Sat, May 6, 2017 at 4:54 PM, Kyle Rose wrote:
> On Sat, May 6, 2017 at 11:12 AM, Ilari Liusvaara > wrote:
>
>> On Sat, May 06, 2017 at 09:43:55AM -0400, Kyle Rose wrote:
>> > I asked this question a while back, and didn't get a satisfying answer:
>> if
>> > an on-path attacker replaces the ea