On 05/23/2017 01:36 PM, David Benjamin wrote:
> On Tue, May 23, 2017 at 1:34 PM Benjamin Kaduk <bka...@akamai.com
> <mailto:bka...@akamai.com>> wrote:
>
>
>     I think this question ends up tying into the more philosophical
>     one of whether early data and 1-rtt data are considered "separate
>     streams" or not -- if they are separate streams with distinct
>     end/start, then of course one wants to detect possible truncation
>     as it happens.  But, if they are conceptually the same stream and
>     the boundary between them is "just" a bookkeeping operation of key
>     change, then there is no need to be concerned about detecting
>     truncation; the application just continues reading in data and
>     replying when complete application protocol requests are received.
>
>
> Truncation detection is meaningful in both cases. We rely on KeyUpdate
> being protected and tied to the immediately preceding record (by way
> of sequence number). Otherwise an attacker could toss out chunks in
> the middle of the stream immediately before a KeyUpdate.
>
Right, but that's also provided for all TLS records by the same
mechanism.  The counterproposal here seems to be for the server
application to consider all the 0-RTT data as a coherent chunk and
provide a single reply to the self-contained application message
contained therein.  That is, it would not expect an application message
to span the 0-RTT/1-RTT boundary.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to