On Sun, Oct 22, 2017 at 8:50 AM, Stephen Farrell <stephen.farr...@cs.tcd.ie>
wrote:

>
>
> On 22/10/17 16:41, Eric Rescorla wrote:
> >
> >> Maybe the thing we could agree at this stage is that the cid scheme
> >> has to be usable in that one-message-per-day scenario and needs to
> >> provide some way that such messages aren't easily linkable based on
> >> cids.
> >
> > I think that's a requirement in some cases but not others. It might be
> > best to settle for the others.
>
> Sorry, I'm not sure what you mean there. Are you saying that you think
> the above requirement can't be met by a generally usable scheme?
>
> I agree that not all scenarios need to meet the req posited above.
>
> I'd worry that if DTLS1.3 can't meet the above requirement then folks
> will invent something that does, which may be worse than using DTLS
> in a bunch of cases. OTOH, one could equally, and maybe fairly, argue
> that DTLS really doesn't scale down quite that far, which'd I guess
> argue that there's a need for some other security protocol for those
> situations.
>

It's not a matter of DTLS versus non-DTLS. I am unaware of any method
of providing conn-IDs that simultaneously meets the requirements of:

- Unlinkability
- Being able to survive multiple conn-ID changes in one round-trip
  (which is implicit in both the one-packet per day and the unknown
  address changes scenarios)
- Low bandwidth
- Good receiver-side scaling (both state and computational)

This is a generic problem, not one limited to DTLS. And as I said earlier,
to the extent to which we either need specific schemes that meet different
subsets of these requirements or we come up with a better generic scheme,
the extension-based approach accommodates it.


PS: I fully accept your point that purely napkin-based schemes aren't
> good enough and if those're the only kind of hash-chain based proposals
>
seen, then the WG oughtn't go for one of those.
>

We've seen others, and they fail the receiver-side scaling test, IMO

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to