Thanks again for your comments. See my reply inline please. ^_^
> 
> I'm not following. If you trust the device, then why do you need any kind of
> cryptographic
> authentication on the token.
> 
> Dacheng:Let assume we trust the device. But the APP use a SNI to indicate the
> service that the APP intends to access. Because the SNI is static which may
> not be changed for months, it is easier for attackers who monitor the network
> to get the SNI and use it to gain benefit. We need a securer solution. As I
> have mentioned in my previous email, this solution will make such attacks more
> difficult. By the way, SNI is not designed for this purpose, we need to do
> some additional work to address this issue, right?

Again, you need a threat model. It sounds like you both do and do not trust
the client

Dacheng: Threat model will be provided. Actually,we don’t try to protect
against the compromise of client. Or the scenario where an APP against
another one on the same device. This solution is used to protect against the
attackers who are able to monitoring the communication between the client
and the server.


> 
> Hmm... I'm not at all sure that TLS should address this problem. However, my
> review
> was directed to whether your proposed solution even works on its own terms.
> 
> Dacheng: That is why we need to raise the discussion here. It would be great
> if this issue could be considered by TLS WG.

I don't find this to be a very compelling use case and I don't think it's
really appropriate to
try to solve it at the TLS layer. If you want to have secure flow
identification you should
do it at the IP or TCP layers.

Dacheng:Ok, this requirement is quite strong. We need a solution to address
this issue if we want to use TLS to secure our APPs deployed on hundreds o
millions o mobile devices.  Also,China mobile and Huawei are working with us
on this issue.

Could you please tell me why it is better to address this issue at the IP or
TCP layer. To the best of my knowledge. There is no space in IPv4 herders to
insert any extensions. There are length limit in TCP options. In addition,
TCP is implemented in kernel mode. It will cost more if we try to address
this issue at the TCP or IP layer.

Look forward to more discussions. ^_^

Cheers

Dacheng
>>> 
>>> 
>> 
> 



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to