On Fri, Mar 25, 2016 at 12:23 PM, Colm MacCárthaigh <c...@allcosts.net>
wrote:

> On Fri, Mar 25, 2016 at 11:36 AM, Eric Rescorla <e...@rtfm.com> wrote:
>
>> On Fri, Mar 25, 2016 at 11:27 AM, Colm MacCárthaigh <c...@allcosts.net>
>> wrote:
>>>
>>> +1 but I think we can go further here and specify 0RTT in such a way
>>> that it only works when the server maintains state, and so that any given
>>> 0RTT ticket may only be used once (to preserve forward secrecy as much as
>>> possible within the constrains of 0RTT).
>>>
>>
>> I'm not enthusiastic about this. This seems like it would rule out a
>> bunch of implementations
>> which don't need that guarantee.
>>
>
> With 0RTT, it doesn't seem to be possible to have anti-replay of the
> message itself without some kind of server state.
>

Yes.



> It's also beneficial for cryptographic safety to prevent at-will re-use of
> the ticket - other-wise the data is subject to the kind of "try and
> iterate" attacks we've seen be very successful against DTLS because of its
> tolerance for duplicate and out of order messages. If server state is
> required, some more good can come of it by improving the forward secrecy of
> the 0RTT data to match that of regular data; which I think is most
> important of all.
>
> An implementation would have to be willing to sacrifice replay protection,
> some cryptographic safety and forward secrecy for the 0RTT data. I'm sure
> there are implementations that would sacrifice these things to get lower
> latency more cheaply, but should they be encouraged?
>

The issue isn't encouraged. It's whether we should design the protocol so
that it cannot be implemented any other way.

-Ekr


>   I'll admit that this is an unfair simplification in this case since it's
> a more grey area, but "fast, secure, cheap: pick two" is at play here, and
> many would pick "fast, cheap".
>
>
> --
> Colm
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to