On Tue, May 02, 2017 at 09:41:00PM -0700, Eric Rescorla wrote:
> On Tue, May 2, 2017 at 9:22 PM, Nico Williams <n...@cryptonector.com> wrote:
> 
> > On Tue, May 02, 2017 at 04:41:52PM -0700, Eric Rescorla wrote:
> > > On Tue, May 2, 2017 at 4:02 PM, Nico Williams <n...@cryptonector.com>
> > wrote:
> > > > On Tue, May 02, 2017 at 03:53:48PM -0700, Eric Rescorla wrote:
> > > > > It's not XOR. It's addition mod 2^32. That's important because the
> > > > > *difference*
> > > > > between the ticket replay times is directly observable anyway.
> > > >
> > > > Computationally there's no real difference between that and XOR.
> > >
> > > What information do you believe you are gathering here?
> >
> > I believe the attack described is finding the time of the session's
> > establishment.
> 
> Hmm.... Can you walk me through how you think that works?

Well, I hadn't done it myself.  I see now though that the attack doesn't
work.

I would still prefer proper encryption.  But this works.

Nico
-- 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to