Thank you all for you answers.

On 30 October 2017 at 15:52, Benjamin Kaduk <bka...@akamai.com> wrote:
> On 10/30/2017 04:51 AM, Jānis Čoders wrote:
>> Thank you. Ok, I understand that some servers could not allow reuse of
>> cookie, but why is it FORBIDDEN by standard? It could be suggested to
>> not reuse in general cases, but if I wanted to use TLS 1.3 with my
>> custom server, which uses cookies to only prevent spoofing attacks (in
>> UDP (DTLS) case). And clients know that they can reuse previous
>> cookies for fast handshake, then why would it be prohibited?
>>
>>
>
> The standard must ensure that compliant clients interoperate with
> compliant servers.  Compliant servers are permitted (expected, even, for
> DTLS!) to offload state such as the handshake hash into the cookie.  A
> client that reused a cookie from an old connection on a new connection
> to such a server would fail to interoperate, as the server would use the
> wrong handshake transcript.  Ergo, the spec strictly forbids clients
> from implementing this behavior in order to preserve interoperability.
>
> There is "nothing" to stop some actor from deploying a noncompliant
> implementation on their own private network where interoperability with
> compliant implementations is not needed, but of course then that actor
> must take responsibility for any changes to the security and privacy
> properties as a result of those noncompliant modifications. In this
> case, for example, the routability proof embedded in the cookie could
> become stale with time (in case of readdressing), and the repeated
> cookie provides linkability between ClientHellos from the same client
> (to an adversary observing at some point in the middle of the network),
> for a start.  No one could guarantee that there are not more changes to
> the security and privacy properties than those already listed, of course.
>
> -Ben



-- 
Ar cieņu,
Jānis Čoders

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to