> The one case here where I'd really argue for a "MUST" is middle-boxes like 
> CDNs. The concern I have is if someone has an application that uses 
> throttling or is vulnerable to a resource-exhaustion problem and goes and 
> puts a CDN in front of it, it's not obvious that enabling TLS 1.3 could open 
> them to a new kind of DOS attack. 

A CDN is not a middle box.  It *is* origin as far as the end-users are 
concerned, because of the business relationship between the CDN and the content 
provider.  Or, if you don't like that reasoning, then it's not a middlebox as 
the IETF uses the term.

If the intermediary is vulnerable to the resource attacks, that's the 
intermediary's issue.

> We've already seen CDNs enable TLS 1.3 with unintentionally broken 0-RTT 
> mitigations, so that's clear evidence that the existing guidance isn't 
> sufficient. I think it would help manage the interoperability risks if we can 
> point out to their customers that the configuration is unambiguously broken. 
> Or at least, it helps to flag it as a security issue, which makes it more 
> likely to get fixed. Absent this, the operators of "backend" applications 
> would have to live with risk that is created by the upstream CDN providers 
> for their own convenience. That seems like a really bad interoperability set 
> up.  

I agree with this.  Which is why I prefer separate streams for early data, and 
some kind of signaling to the content provider that is clear and unambiguous.  
I don't know how to do that when, say, the intermediary/CDN has a persistent 
connection to the backend...

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to