On Tue, Jun 12, 2018 at 11:32 AM David Benjamin <david...@chromium.org> wrote:
>
> On Tue, Jun 12, 2018 at 2:01 PM Christopher Wood 
> <christopherwoo...@gmail.com> wrote:
>>
>> On Tue, Jun 12, 2018 at 10:55 AM Kyle Nekritz <knekr...@fb.com> wrote:
>> >
>> > Since the Certificate message is sent in an encrypted record, the normal 
>> > record padding mechanism (section 5.4) can be used, rather than sending 
>> > the padding as actual handshake data.
>>
>> Of course, and that requires padding on the fly and some way for the
>> sender to know what is the correct amount of padding per Certificate.
>> Plumbing up that API seems non-trivial. In comparison, one could
>> imagine pre-padding wire-encoded Certificate messages a priori using
>> the extension. So I still think restricting padding to CH is a bit
>> extreme.
>
>
> Using the padding extension isn't going to mesh well with the compressed 
> certificates draft. (Compression is perfectly compatible with hiding the 
> length. If all your certificates compress well---they probably do---you can 
> pad based on the distribution of compressed lengths you're trying to mask. Of 
> course, this will leak whether compression happened, but that's not the 
> information that's interesting to hide.)

Yep, valid point.

>
> Record-level padding is indeed kind of annoying to plumb properly though. 
> I've always thought the excitement for padding at that layer was somewhat 
> misplaced. I could imagine allowing handshake messages to be punctuated by 
> no-op padding messages, but then it's just one layer to route through to get 
> to the record layer here. I think it's more at higher up the stack where 
> record-level padding really becomes impractical.

To be clear, are you suggesting that adding a padding extension to the
Certificate message is impractical? (I wouldn't consider this
record-level padding.)

Best,
Chris

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to