Given that 0-RTT and 1-RTT guarantees are very different, it seem important to 
distinguish the two streams and model them separately.

Of course that does not prevent applications that want to treat them as a 
single stream, but it is harder to understand the security one gets from such a 
mixed channel, e.g. some requests may have strong replay protection, others 
won’t.

--markulf

From: Benjamin Kaduk [mailto:bka...@akamai.com]
Sent: 23 May 2017 18:35
To: Markulf Kohlweiss <mark...@microsoft.com>; tls@ietf.org
Cc: Samin Ishtiaq <samin.isht...@microsoft.com>; Antoine Delignat-Lavaud 
<an...@microsoft.com>; Britta Hale <britta.h...@item.ntnu.no>
Subject: Re: [TLS] Comments on EndOfEarlyData

My initial thoughts...

On 05/23/2017 06:50 AM, Markulf Kohlweiss wrote:


I am paraphrasing a long thread on the issue that we had within

the miTLS development team, and I am primarily commenting on the

analysis aspects. I also hope that it will clarify any remaining

problems of understanding that I have on the issue.



If we see EOED as a stream termination signal, then there seems

to be a difference in performance for conservative servers that

want to wait until receiving all 0RTT data before responding to

the client's request in 0.5RTT communication.



Said otherwise, we want servers to be able to respond with application

data based on application data from the client and know that that

that data was not truncated.

Thanks, the keyword of "truncated" caused me to understand the intended point.

I think this question ends up tying into the more philosophical one of whether 
early data and 1-rtt data are considered "separate streams" or not -- if they 
are separate streams with distinct end/start, then of course one wants to 
detect possible truncation as it happens.  But, if they are conceptually the 
same stream and the boundary between them is "just" a bookkeeping operation of 
key change, then there is no need to be concerned about detecting truncation; 
the application just continues reading in data and replying when complete 
application protocol requests are received.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to