On Thu, Sep 01, 2016 at 02:11:13PM -0700, Keith Winstein wrote:
> I think we have to oppose a change to KeyUpdate that adds P4 (bounded
> write obligations) but not P3 (ability to learn that a KeyUpdate was
> read by other side). These are orthogonal and easily achievable with a
> pretty small tweak. Here are four options that would work for us:

Unfortunately, one can get into situations like this (saw this
in testing):

1) Client send KeyUpdate[req=true] (and continues blasting data)
2) Server receives the KeyUpdate[req=true]
3) Server queues a KeyUpdate[req=false], it gets stuck.
4) Client send KeyUpdate[req=true] (and continues blasting data)
5) Server receives the KeyUpdate[req=true]
6) Server quenches the KeyUpdate, since it has fresh keys.
7) Client send KeyUpdate[req=true] (and continues blasting data)
8) Server receives the KeyUpdate[req=true]
9) Server quenches the KeyUpdate, since it has fresh keys.
10) Server sends something, the KeyUpdate gets unstuck.
11) The client receives the KeyUpdate[req=false]


Considering those KeyUpdates are triggered every ~5min (by volume
trigger[1]), effective RTT was something like ~10-15min (despite sub-
millisecond transport latencies). And the 1 server-sent KeyUpdate
was in reaction to first client KeyUpdate, not the last...


[1] Set at 10,000,000 records (even for 0x1303, which can handle
far far more).


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to