On Tue, Mar 15, 2016 at 2:45 PM, Colm MacCárthaigh <c...@allcosts.net>
wrote:

> I think I agree with that; but maybe would state it as: we can preserve
> forward secrecy and replay mitigation for 0RTT data, but at the cost of
> read-after-write consistency from a server-side data-store. The store
> needn't be transactional, an eventually consistent store could be used: but
> the miss-rate would be elevated over what we see today. So it would work
> better in the single server case than the many distributed servers case -
> but could work for both.
>

Hmm... my first thought is we can't say all that in a "simple secure 0-RTT"
description :)  I do think it would help if all that and more were in a
more comprehensive document somewhere.


>
>> The other camp is HTTP-like protocols that terminate all over the place.
>> These all seem to be replay-tolerant because random network errors will
>> cause random replays, and there is no efficient way to synchronize the
>> session cache globally.
>>
>
> I think that's a dangerous position too. Triggering browser retries
> requires a certain level of difficulty and has a certain amplification
> factor. Sniffing wifi and sending a TCP message is far easier. An attacker
> could exhaust things like server-side request throttling limits far more
> quickly with the latter than the former. Besides: lowering our own levels
> of security because other tools have already done the same is just another
> race to the bottom.
>

I would be happy if we could recommend at least one reasonably secure
method for 0-RTT for HTTPS that has a reasonable chance of satisfying the
skeptics, and then state that 0-RTT for other protocols, and stateless
0-RTT, needs to be carefully considered for the application.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to