> On May 2, 2017, at 9:45 PM, Colm MacCárthaigh <c...@allcosts.net> wrote:
> 
> I think we have to assume that a replay attempt could come at any time.
> A time based mitigation doesn't work.

A time-based mitigation does not remove the need for an anti-replay
cache (where a service protocol, supports 0-RTT, but is not idempotent).

What I am saying, is that a time-based counter-measure can substantially
reduce the size of the required cache, because out-of-window replays
are rejected.  That replay window can be a narrow window around the time
the ticket is first (and never again legitimately) used, rather than the
much larger ticket validity interval.

The obfuscated_ticket_age field makes it possible to determine which
transmissions are "in-window".  It remains an exercise for the implementor
to handle "in-window" replays appropriately.

I agree with Nico that additive obfuscation feels like a hack, but am
willing to accept this as somewhat "natural" within the design tradition
of TLS.

Could someone explain how observing ticket reuse reveals the secret
"ticket_age_add" value?  The situation seems "time translation
invariant" under changes in the "ticket_age_add" value.  Doesn't the
attacker see the same result as he would see with a for an offset
"ticket_age_add" obtained at a corresponding offset time in the past?

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to