On Sun, Mar 13, 2016 at 9:29 PM, Bill Cox <waywardg...@google.com> wrote:

> On Sun, Mar 13, 2016 at 6:26 PM, Harlan Lieberman-Berg <
> hlieber...@setec.io> wrote:
>
>> Bill Cox <waywardg...@google.com> writes:
>>
>> More generally, I strongly believe that TLS 1.3 should not
>> provide options which we think should be restricted to "admins who know
>> what they're doing".  These end up hurting us down the line (cf EXPORT
>> cipher suites.)
>>
>> I think we should ship the parts of 0-RTT that we believe are
>> intrinsically safe for (the vast majority) of the internet to enable and
>> use on day 1.
>>
>
> This is just my opinion, not Google's.  Here is a dumb idea I just had:
>
> The current 0-RTT modes described in TLS 1.3 are clearly only for admins
> who really know what they are doing.  If the current 0-RTT modes are deemed
> to dangerous, then how about going back to session IDs, and doing 0-RTT
> resumption from the session cache?
>

Isn't this more or less what we have been calling PSK-resumption? Can you
explain
the difference?
-Ekr


> This is not only fairly simple given the existing code base, but it fits
> well with my personal bias towards supporting strong client authentication,
> which basically got thrown under the bus in the current 0-RTT scheme.
> Frankly, my current job (working on token binding) is a lot less appealing
> in a world where servers cannot do proofs-of-possession with clients.  With
> 0-RTT cached session resumption, the TLS sequence numbers remain intact,
> and we inherit the security parameters from the original connection.  The
> new replay attacks go away, as do most of the "new and exciting" ways to
> PWN TLS 1.3 0-RTT.
>
> The new tickets could still be supported to enable advanced operators the
> flexibility they need to implement stateless 0-RTT, but from the TLS point
> of view, it would just be a 0-RTT resume using a session ID, with
> additional ticket data.  If the admins at a particular company want to
> stuff all the session state into the ticket and accept the security
> consequences of stateless 0-RTT resumption, I think they should have the
> flexibility to do that.  I _think_ the new tickets give them what they need.
>
> This would enable the standard 0-RTT resume to be as secure as keeping the
> connection alive the whole time.  I think it would stop this "race to the
> bottom" problem people are worried about on this thread.
>
> So... how dumb is this idea?
>
> Bill
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to