On 06/01/2017 03:50 PM, Victor Vasiliev wrote:
>
>         To clarify, I am not suggesting that two streams would help. 
>         I completely
>         agree with you that two streams is not going to mitigate the
>         DKG attack or
>         others.  What I meant is that 0-RTT inherently has slightly
>         different
>         properties from 1-RTT and must be used with that in mind. 
>         Specifically, I
>         meant that it will not be enabled for applications by default,
>         and HTTP clients
>         would only allow it for methods that RFC 7231 defines as safe.
>
>
>     Well in the real world, I think it'll be pervasive, and I even
>     think it /should/ be. We should make 0-RTT that safe and remove
>     the sharp edges. 
>
>
> Are you arguing that non-safe requests should be allowed to be sent
> via 0-RTT?
> Because that actually violates reasonable expectations of security
> guarantees
> for TLS, and I do not believe that is acceptable.
>
Do we have a good example of why a non-safe HTTP request in 0-RTT would
lose specific properties required for security?  If so, that seems like
a good thing to include in the TLS 1.3 spec as an example of what can go
wrong.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to