On Sun, Mar 13, 2016 at 09:26:14PM -0400, Harlan Lieberman-Berg wrote: > > I agree with a slight tweak in wording here, Bill. I think that we > /should/ drop the parts of 0-RTT where we are not confident that an > admin who blindly enables functionality in TLS 1.3 will not end up > harming themselves. > > More generally, I strongly believe that TLS 1.3 should not > provide options which we think should be restricted to "admins who know > what they're doing". These end up hurting us down the line (cf EXPORT > cipher suites.) > > I think we should ship the parts of 0-RTT that we believe are > intrinsically safe for (the vast majority) of the internet to enable and > use on day 1.
Here are what I think would be reasonable restrictions on 0-RTT: - Require labeling the application protocol 0RTT data is for. * To prevent cross-protocol attacks. - Require application protocol to profile the semantics of 0RTT data. * To at least get some idea of protocol-level security properties. * Some applications might need to handle 0RTT specially for security reasons (HTTP/2?) - Require application to specifically request 0RTT data. * To prevent unaware applications from thinking it has the same properties as main data. - Require 0RTT data to be kept separate from main application data. * To make more difficult for applications to mix it up. - Ensure that no 0RTT mode invokes screwy cryptographic behaviour. * Famous last words: "Not believed to be exploitable". And none of these should be subject to "admin configuration" (disabling entiere 0-RTT is). -Ilari _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls