On 4/2/16, 14:53, "Karthik Bhargavan" <karthikeyan.bharga...@inria.fr> wrote:

>
>Here is a proposal that would avoid trial decryption.
>When the client sends 0-RTT application data, it currently
>ends this flight of messages with an encrypted end_of_early data warning alert.
>How about: if the server rejects trial decryption, the client
>must then send an *unencrypted* end_of_early_data warning alert before
>continuing with 1-RTT handshake data.
>The server could then easily discard all records until it sees this warning 
>alert.
>
>The main disadvantage of this approach seems to be that it reveals to the 
>adversary
>the point at which the 0-RTT application data ends (if this is sensitive 
>information.)
>However, note that if the length of 0-RTT data was sensitive, an attacker
>could probably already obtain it by delaying the server flight.
>
>Does anyone see other practical or security disadvantages to using this alert?

I tried to think of ways that a misbehaving client (or attacker) could cause a 
server relying on the unencrypted alert to consume resources and sit around 
waiting for a long time, but it seems like the unencrypted alert is strictly 
better than trial decryption in that regard (since the server doesn't have to 
burn CPU on decryption).  So, it seems that revealing the length of the 0-RTT 
data is the main disadvantage, but as Ilari notes, there are likely to be other 
channels that would leak that boundary in many cases.

Using the unencrypted alert does also provide a clear indication that the 
client/server failed to exchange 0-RTT data; for a PSK mode with a cache of 
0-RTT sessions this could provide a window into the validity periods used by 
the two parties or as a signal that a finite-sized cache is full and ejecting 
old entries.  Perhaps an attacker could use that signal to determine the rate 
of some other sort of attack that requires getting a session evicted from the 
cache, but the need for such a signal seems pretty hypothetical, given that an 
attacker can already claim to be as many different clients as it wants.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to