On Wed, Mar 30, 2016 at 10:40 PM, Dacheng Zhang <dacheng....@alibaba-inc.com
> wrote:

> Thanks again for your comments. See my reply inline please. ^_^
>
>>
>> I'm not following. If you trust the device, then why do you need any kind
>> of cryptographic
>> authentication on the token.
>>
>> Dacheng:Let assume we trust the device. But the APP use a SNI to indicate
>> the service that the APP intends to access. Because the SNI is static which
>> may not be changed for months, it is easier for attackers who monitor the
>> network to get the SNI and use it to gain benefit. We need a securer
>> solution. As I have mentioned in my previous email, this solution will make
>> such attacks more difficult. By the way, SNI is not designed for this
>> purpose, we need to do some additional work to address this issue, right?
>>
>
> Again, you need a threat model. It sounds like you both do and do not
> trust the client
>
> Dacheng: Threat model will be provided. Actually,we don’t try to protect
> against the compromise of client. Or the scenario where an APP against
> another one on the same device. This solution is used to protect against
> the attackers who are able to monitoring the communication between the
> client and the server
>

I'll await this.



>
>
>> Hmm... I'm not at all sure that TLS should address this problem. However,
>> my review
>> was directed to whether your proposed solution even works on its own
>> terms.
>>
>> Dacheng: That is why we need to raise the discussion here. It would be
>> great if this issue could be considered by TLS WG.
>>
>
> I don't find this to be a very compelling use case and I don't think it's
> really appropriate to
> try to solve it at the TLS layer. If you want to have secure flow
> identification you should
> do it at the IP or TCP layers.
>
> Dacheng:Ok, this requirement is quite strong. We need a solution to
> address this issue if we want to use TLS to secure our APPs deployed on
> hundreds o millions o mobile devices.  Also,China mobile and Huawei are 
> working
> with us on this issue.
>

No, you only need it if you want to use a specific charging model.


Could you please tell me why it is better to address this issue at the IP
> or TCP layer. To the best of my knowledge. There is no space in IPv4
> herders to insert any extensions. There are length limit in TCP options. In
> addition, TCP is implemented in kernel mode. It will cost more if we try to
> address this issue at the TCP or IP layer.
>

I think the architectural reasons here are pretty clear. IP is the common
network transport
layer, not TLS. Also, IPv6 has extension headers.

-Ekr


Look forward to more discussions. ^_^
>
> Cheers
>
> Dacheng
>
>>
>>>>
>>>>
>>>
>>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to