On Mon, Oct 12, 2015 at 7:58 AM, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:

> On Mon, Oct 12, 2015 at 04:48:08AM -0700, Eric Rescorla wrote:
> > On Mon, Oct 12, 2015 at 4:40 AM, Hubert Kario <hka...@redhat.com> wrote:
> >
> > > aren't we still missing the 0-RTT mode?
> >
> > It's in the current draft though there are a few details that we're
> > going to need to nail down over the next few weeks and in Yokohama.
>
> IMO, that should be nailed rather quick, given that that what there
> is right now isn't really sufficient to analyze it.
>

Yes, that's the plan, as noted above.



> However, some comments about 0-RTT:
>
>
> 1) It seems to me that if server key is compromised, MITM can
> substitute 0-RTT data with its own (at least if original and modified
> one have the same number of records). And such modification will not
> be detected by handshake, which will complete successfully.
>
> Perhaps the comment about impersonation with compromised server key
> was about this (I can't get more usual types of attacks to work)?
>

Yes, that's the idea.



2) If static client authentication is used with 0-RTT data, the client
> authentication always preceeds 0-RTT data (it is first in early
> handshake, and using 1-RTT client auth is forbidden). This seems to
> imply 0-RTT data should be interpretted in an authenticated context,
> which seems dangerous given the replayability of the 0-RTT data.
>

Well remember that applications already have this problem because
they send cookies and the like in their HTTP requests. So, I don't
know how much this alters the analysis. And yes, we do have settings
where we need this



3) The document talks about making 0-RTT data unreplayable by using
> extra identifier agreed out-of-band. Does that actually work, given
> the likely auto-replay by the client?


I'm assuming that in these cases the server has global state and so doesn't
have a problem.

-Ekr


>
>
> -Ilari
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to