On Tue, Jun 21, 2016 at 8:58 PM, Martin Thomson
<martin.thom...@gmail.com> wrote:
> On 22 June 2016 at 12:01, Watson Ladd <watsonbl...@gmail.com> wrote:
>> Why isn't 0-RTT an extension in the Client Hello to deal with this?
>
> You can't stream extensions, which unfortunately is required given how
> most software interacts with their TLS stack.

A few months ago we had a lengthy discussion on the list and at TRON
about how risky 0-RTT is. This culminated in the idea that 0RTT data
should be provided through a distinct channel to the application,
along with feedback about whether it was not accepted. If we're
willing to change the interaction pattern to support that, we can
accommodate using 0RTT as an extension by gathering it all and sending
when the handshake happens. But it sounds like you are discussing a
design where the handshake fakes completion if 0-RTT is on, and at
some point later "well, i didn't actually send the data you wanted
to". Or am I missing something about the API design that is motivating
this streaming approach?

>
> Let's be clear, the actual risk we're talking about is pretty-much
> confined to screw-ups.  The deployment screwup where you left one
> server speaking TLS 1.2 somewhere before turning 0-RTT on; and TLS
> MitM, which calling a screw-up might be too positive a statement.

Or you turned on 0-RTT and then got a security advisory resulting in
rolling back to TLS 1.2.
>
> Of course, David is right that screw-ups like this are too common for
> us to do nothing about them.



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to