Got it — thanks for the clarification! I agree with your conclusion assuming we 
do not want to make an incompatible wire format change. However, if we’re 
willing to budge on that, I think it’s worth including. I’m curious to hear 
what others think.

Best,
Chris
On Jun 12, 2018, 11:48 AM -0700, David Benjamin <david...@chromium.org>, wrote:
> > On Tue, Jun 12, 2018 at 2:44 PM Christopher Wood 
> > <christopherwoo...@gmail.com> wrote:
> > > On Tue, Jun 12, 2018 at 11:32 AM David Benjamin <david...@chromium.org> 
> > > wrote:
> > > >
> > > > On Tue, Jun 12, 2018 at 2:01 PM Christopher Wood 
> > > > <christopherwoo...@gmail.com> wrote:
> > > >>
> > > >> On Tue, Jun 12, 2018 at 10:55 AM Kyle Nekritz <knekr...@fb.com> wrote:
> > > >> >
> > > >> > Since the Certificate message is sent in an encrypted record, the 
> > > >> > normal record padding mechanism (section 5.4) can be used, rather 
> > > >> > than sending the padding as actual handshake data.
> > > >>
> > > >> Of course, and that requires padding on the fly and some way for the
> > > >> sender to know what is the correct amount of padding per Certificate.
> > > >> Plumbing up that API seems non-trivial. In comparison, one could
> > > >> imagine pre-padding wire-encoded Certificate messages a priori using
> > > >> the extension. So I still think restricting padding to CH is a bit
> > > >> extreme.
> > > >
> > > >
> > > > Using the padding extension isn't going to mesh well with the 
> > > > compressed certificates draft. (Compression is perfectly compatible 
> > > > with hiding the length. If all your certificates compress well---they 
> > > > probably do---you can pad based on the distribution of compressed 
> > > > lengths you're trying to mask. Of course, this will leak whether 
> > > > compression happened, but that's not the information that's interesting 
> > > > to hide.)
> > >
> > > Yep, valid point.
> > >
> > > >
> > > > Record-level padding is indeed kind of annoying to plumb properly 
> > > > though. I've always thought the excitement for padding at that layer 
> > > > was somewhat misplaced. I could imagine allowing handshake messages to 
> > > > be punctuated by no-op padding messages, but then it's just one layer 
> > > > to route through to get to the record layer here. I think it's more at 
> > > > higher up the stack where record-level padding really becomes 
> > > > impractical.
> > >
> > > To be clear, are you suggesting that adding a padding extension to the
> > > Certificate message is impractical? (I wouldn't consider this
> > > record-level padding.)
> >
> > Sorry, that was probably unclear. What I meant was: I agree that 
> > record-level padding is pretty difficult to use in general, but this 
> > particular instance is probably(?) not too bad, so it seems sufficient to 
> > use the existing mechanism rather than make a wire-incompatible change 
> > (unsolicited Certificate extensions are forbidden) at this stage.
> >
> > Though I otherwise don't particularly object to jamming the padding 
> > extension into more places, the compressed certificates point aside.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to