On Sat, Oct 14, 2017 at 9:54 AM, Benjamin Kaduk <bka...@akamai.com> wrote:

> On 10/12/2017 06:13 PM, Eric Rescorla wrote:
>
> Hi folks,
>
> I have just posted a first cut at a connection ID draft.
> https://tools.ietf.org/html/draft-rescorla-tls-dtls-connection-id-00
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Drescorla-2Dtls-2Ddtls-2Dconnection-2Did-2D00&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=sssDLkeEEBWNIXmTsdpw8TZ3tAJx-Job4p1unc7rOhM&m=CDf7zAKso3W-qOi8wQqK6uWaBGWhWCn6w5Q5gFHEjUY&s=1hkGM7Hn4fhvL0vEqnLxYGyRwan9tjm4IICGPgXS4eo&e=>
>
> Comments welcome.
>
>
> I see it already got some good comments, so I'll try to stick to just new
> ones.
>
> Since a participant that wants to make use of DTLS CIDs might expect to
> talk to many peers, some of which do and some of which do not support the
> CID extension, it seems like the participant might want to always use the
> same cid_length for all its peers that support CIDs, to ease the parsing
> decision and CID lookup process, and we could mention this expectation. Or
> am I missing some reason why the CID would be easy to pick out of the
> ciphertext otherwise?
>

No, I think that's a good suggestion. PR Welcome :)


In the security/privacy considerations:
>
>    An on-path adversary, who is able to observe the DTLS 1.2 protocol
>    exchanges between the DTLS client and the DTLS server, is able to
>    link the initial handshake to all subsequent payloads carrying the
>    same connection id pair (for bi-directional communication).
>
> My first time reading this I thought that the text was only claiming that 
> linkability was possible if the initial handshake was observed, which is not 
> really needed.  It might be better to avoid mentioning the handshake at all 
> and just say that the attacker is able to link all observed payloads carrying 
> the same connection id pair as being exchanges between the same client and 
> server.
>
>
Yeah, that seems like a good point.

-Ekr


> -Ben
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to