Re: [TLS] The case for a single stream of data

2017-05-06 Thread Ilari Liusvaara
On Fri, May 05, 2017 at 09:28:07AM -0700, Colm MacCárthaigh wrote: > I wanted to start a separate thread on this, just to make some small > aspects of replay mitigating clear, because I'd like to make a case for TLS > providing a single-stream, which is what people seem to be doing anyway. Coupl

Re: [TLS] The case for a single stream of data

2017-05-06 Thread Salz, Rich
What about when *part* of a request is in the 0RTT part, and the rest of it isn’t? I believe this will happen often for H2 initial setup. Imagine the “fun” when initial connection data, such as login cookies, is replayed in other contexts and eventually decrypted? -- Senior Architect, Akamai

Re: [TLS] The case for a single stream of data

2017-05-06 Thread Kyle Rose
On Sat, May 6, 2017 at 8:22 AM, Salz, Rich wrote: > > What about when **part** of a request is in the 0RTT part, and the rest > of it isn’t? I believe this will happen often for H2 initial setup. > Imagine the “fun” when initial connection data, such as login cookies, is > replayed in other cont

Re: [TLS] The case for a single stream of data

2017-05-06 Thread Ilari Liusvaara
On Sat, May 06, 2017 at 09:43:55AM -0400, Kyle Rose wrote: > On Sat, May 6, 2017 at 8:22 AM, Salz, Rich wrote: > > > > > What about when **part** of a request is in the 0RTT part, and the rest > > of it isn’t? I believe this will happen often for H2 initial setup. > > Imagine the “fun” when init

Re: [TLS] The case for a single stream of data

2017-05-06 Thread Kyle Rose
On Sat, May 6, 2017 at 11:12 AM, Ilari Liusvaara wrote: > On Sat, May 06, 2017 at 09:43:55AM -0400, Kyle Rose wrote: > > I asked this question a while back, and didn't get a satisfying answer: > if > > an on-path attacker replaces the early data with a replay from an earlier > > connection, does

Re: [TLS] Security review of TLS1.3 0-RTT

2017-05-06 Thread Christian Huitema
On 5/4/2017 10:12 PM, Eric Rescorla wrote: > > Obligatory note that if clients are forbidden from reusing a single > PSK for multiple 0-RTT, they can still use it for 1-RTT. Yes, they can. But doing so leaks a unique identifier, which can be used to link sessions. When I look at the privacy impl

Re: [TLS] Security review of TLS1.3 0-RTT

2017-05-06 Thread Eric Rescorla
On Sat, May 6, 2017 at 5:35 PM, Christian Huitema wrote: > > > On 5/4/2017 10:12 PM, Eric Rescorla wrote: > > > > Obligatory note that if clients are forbidden from reusing a single > > PSK for multiple 0-RTT, they can still use it for 1-RTT. > > Yes, they can. But doing so leaks a unique identif

Re: [TLS] The case for a single stream of data

2017-05-06 Thread Eric Rescorla
On Sat, May 6, 2017 at 4:54 PM, Kyle Rose wrote: > On Sat, May 6, 2017 at 11:12 AM, Ilari Liusvaara > wrote: > >> On Sat, May 06, 2017 at 09:43:55AM -0400, Kyle Rose wrote: >> > I asked this question a while back, and didn't get a satisfying answer: >> if >> > an on-path attacker replaces the ea