On 07/11/2017 03:50 PM, Eric Rescorla wrote: > > > On Tue, Jul 11, 2017 at 1:39 PM, Benjamin Kaduk <bka...@akamai.com > <mailto:bka...@akamai.com>> wrote: > > > Another question I also relates to 0-RTT, specifically with the > freshness checks and the case where the computed > expected_arrival_time is in outside "the window" by virtue of > being in the future. (See the Note: at the end of section 8.2.) > (The case where the expected_arrival_time is in the past can > clearly be treated as "this is a stale request" and the current > text about aborting with "illegal_parameter" or rejecting 0-RTT > but accepting the PSK is acceptable, even if it doesn't give > guidance as to what might cause someone to pick one behavior or > the other.) I am wondering whether we should consider this to be > a potential attack and abort the connection. I concede that there > are likely to be cases where this > situation occurs incidentally, for clients with extremely > fast-running clocks, and potential timezone/suspend-resume > weirdness. But there is also the potential for a client that > deliberately lies about its ticket age and intends to replay the > wire messages when the age becomes in window, or an attacker that > records the messages and knows that the client's clock is too > fast, or other cases. (A client that deliberately does this could > of course just send the same application data later as well.) If > the time is only a few seconds out of the window, then delaying a > response until it is in the window and only then entering it into > the single-use cache might be reasonable, but if the time is very > far in the future, do we really want to try to succeed in that case? > > > If the time is very far in the future, the text is supposed to tell > you to fall back > to 1-RTT... >
I agree that that is what the text currently says. I'm questioning whether that's actually the behavior we want. That is, in this case, the CH+0RTT data can be replayed by an observer once enough time has elapsed that the expected_arrival_time is within the window, similar to one of the reordering attacks mentioned elsewhere. We could add the CH to the strike register in this case, which would bloat its storage somewhat and have entries that take longer than the window to expire out. I don't have a good sense for how often we expect postdated CHs to occur and whether the ensuing breakage would be manageable, but I'm not sure that we've thought very hard as a group about this question. > > > It looks like we no longer do anything to obsolete/reserve/similar > the HashAlgorithm and SignatureAlgorithm registries; was that just > an editorial mixup or an intended change? > > > https://tlswg.github.io/draft-ietf-tls-iana-registry-updates/#orphaned-registries > <https://urldefense.proofpoint.com/v2/url?u=https-3A__tlswg.github.io_draft-2Dietf-2Dtls-2Diana-2Dregistry-2Dupdates_-23orphaned-2Dregistries&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=sssDLkeEEBWNIXmTsdpw8TZ3tAJx-Job4p1unc7rOhM&m=BMArYHEvmklJ5o8KreHqXeVRBDLx5CLzLwErLvjyUWk&s=3RGXDDdDzmF81eYcffxZOyJWazAfg8Uk45evFm9yMo0&e=> > Oh right, I forgot about that -- thanks. > > We removed the API guidance for separate APIs for read/writing > early data versus regular data, which I believe had consensus. > But I thought we were going to say something carefully worded > about having an API to determine whether the handshake has > completed (or client Finished has been validated, or ...), and it > looks like this is buried at the end of E.5(.0), with the string > "API" not appearing. It might be useful to make this a little > more prominent/discoverable, whether by subsection heading or > otherwise. > > > Suggestions welcome for where this would be better.... > I'll see if I have time to think about it some more. -Ben
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls