I'm with Valery here. IMHO the proposed mechanism makes little sense because 
(politics notwithstanding) it offers little gain in return of a significant 
(possibly unacceptable) burden to important use cases. 

Personally I'm firmly against it. 

<proper disclaimers>
Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network.
From: Valery Smyslov
Sent: Friday, December 4, 2015 07:57
To: Bryan Ford
Cc: tls@ietf.org
Subject: Re: [TLS] Fully encrypted and authenticated headers (was Re: 
Encrypting record headers: practical for TLS 1.3 after all?)

 
As far as I understand your proposal makes impossible to use this trick, 
if we consider packets loss and reordering.

Actually, if I’m understanding correctly how you’re doing this per-datagram 
rekeying, I think it still should be compatible with the hash-table-based 
approach I proposed.  Assuming you’re using some key derivation function that 
takes a master key and sequence number as input and produces a per-datagram 
key, the receiver just needs to pre-compute the per-datagram keys for the 
sequence numbers within the current window, and encrypt the sequence numbers 
with those respective per-datagram keys, in order to populate its hash table.  
I don’t think anything breaks at least.
I would say that the hash-table-based approach would work in theory.
In practice it either implies too much burden on the receiver or would fail
in some situations. Consider, for example, situation when the sender
skips large amount of sequence numbers (say 2^32) for some reason.
It would be difficult for receiver to build such a hash table.
 
Regards,
Valery Smyslov.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to