On Sat, 12 Sep 2015 13:49:49 -0700
Eric Rescorla <e...@rtfm.com> wrote:

> Issue: https://github.com/tlswg/tls13-spec/issues/242
> 
> In https://github.com/tlswg/tls13-spec/pull/231, Brian Smith argues:
> 
> "Nobody must ever be *required* to send an alert. Any requirement for
> sending an alert should be SHOULD, at most."

Just a quick thought on this: We had vulns in the distant past that
relied on different reactions to different errors (Vaudenay / Padding
Oracle attack).

The Vaudenay attack is history because we agreed long that CBC/HMAC
with MAC-then-Encrypt will be gone. But I think making the error alert
optional may lead to similar attacks. An implementation may decide to
send an error alert in one situation and no error in another. This
may leak information valuable to an attacker.

I generally think having a more strict spec with less wiggle room is
better. Therefore: I think a MUST is better.

-- 
Hanno Böck
http://hboeck.de/

mail/jabber: ha...@hboeck.de
GPG: BBB51E42

Attachment: pgpwV5RTpF9Bz.pgp
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to