On Fri, Jun 23, 2017 at 10:44:00AM -0700, Eric Rescorla wrote:
> 
> On Fri, Jun 23, 2017 at 9:21 AM, Joseph Salowey <j...@salowey.net> wrote:
> 
> > Discussion on this topic is dying down, can you post a PR so we can see
> > the proposed text.  There is still some discussion on the API thread so
> > there may be some additional modifications coming in that area.
> >
> PR up:
> https://github.com/tlswg/tls13-spec/pull/1034

I didn't see any mention of the cache probing attack.

I.e., Leak data from 0-RTT requests (especially URLs) by first priming
caches using 0-RTT replay and then probe the caches using normal
requests.

This attack can be viable even at low replay count, it isn't like the
others that require very high number of replays. And in fact, it
benefits from having numerious zones.


E.g., CDNs that have multiple datacenters that accept 0-RTT tickets of
each other seem vulernable to abusing this for discovering HTTP GET
URLs in 0-RTT requests.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to