On May 4, 2017, at 19:35, Watson Ladd <watsonbl...@gmail.com> wrote:
> 
> Dear all,
> 
> Applications have always had to deal with the occasional replay,
> whether from an impatient user or a broken connection at exactly the
> wrong time. But they've generally been rare, so human-in-the-loop
> responses work. Order the same book twice? Just return one of them,
> and if you get an overdraft fee, ouch, we're sorry, but nothing we can
> do.

Very few applications have been designed with deliberate malicious 
“intelligent” interference in mind. Probably none among those that delegate 
their communications security to a “security protocol” such as TLS or IPsec. 
After all, a big selling point of using (somebody else’s) security 
protocol/implementation is that the security responsibilities are “outsourced” 
to that other layer/entity/<you got the idea>.

Haven’t you heard this: “I don’t know how to secure my pipe, and I don’t have 
to - I use TLS for that”.

So far the consequences have been rather mild, not much worse than what Watson 
showed as examples to illustrate his point. But it is changing, and not for the 
better.
 
Summary: it is not good to deliberately ignore malicious replays.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to