On Sat, Jul 01, 2017 at 10:26:17AM -0700, Eric Rescorla wrote:
> On Sat, Jul 1, 2017 at 10:01 AM, Ilari Liusvaara <ilariliusva...@welho.com>
> wrote:
> 
> > On Sat, Jun 24, 2017 at 12:05:44PM -0700, Eric Rescorla wrote:
> > > On Sat, Jun 24, 2017 at 9:47 AM, Ilari Liusvaara <
> > ilariliusva...@welho.com>
> > > wrote:
> >
> > IMO, since handshake only occurs once per connection and DTLS needs to
> > be implemented on all kinds of constrained devices (on both client and
> > server sides), simplicity is more important than performance. Also,
> > packet loss estimates do not seem useful: There are far too few packets
> > to get useful statistics.
> >
> 
> I think we definitely want to allow acknowledgements of subcomponents of
> messages, because otherwise you have to retransmit the entire message,
> which is painful in the case of the obese messages. This seems to leave
> one with the option of acknowledging either fragments (which we then
> need to invent labels for) or records (which already have labels
> but need a map of RSN to fragment). My feeling is that on balance the
> latter is a better choice, but I'll have a better sense once we've
> implemented....

Just noticed that DTLS allows packing multiple independent fragments
into one record (and then multiple records into one packet).

Which impiles that an implementation that only prcesses one message at
a time is not guaranteed to even be able to generate a valid list of
RSNs to ACK, in case the peer sends sufficiently twisted (but still
seemingly in-spec) input.

What's the alert code for dropping in-spec connection detected as
attack traffic? :-)




-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to