On Tue, Dec 18, 2018 at 1:27 AM Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

> On Tue, Dec 18, 2018 at 12:45:22AM -0600, David Benjamin wrote:
>
> > An earlier iteration even placed the retry on the same connection, which
> > makes the analog clearer.  (Doing it in the same connection is rather a
> > mess, so we bounce to a new one.)
>
> Any concern about the possibility that the reason the key did not
> work was that the particular server had unexpected keys, but
> reconnecting might land on a different server, with yet another set
> of keys?  (Which is to say that I am concerned, but perhaps you're
> not?).
>

That's a good point. This probably means the client needs to allow for a
handful of iterations before giving up, which is a bit of a nuisance.


> Also connection re-establishment has considerable cost, additional
> TCP roundtrips on top of the extra TLS roundtrips.
>

Agreed. The other cost is that it cannot be implemented entirely within the
TLS stack, since most TLS stacks do not establish connections. (Though ESNI
already needs caller involvement anyway to get the ESNI keys out of DNS,
and the perf overhead can be fine if you believe it's rare.)

Is the HRR idea being explored in the parallel thread not viable?
> [ That'd be fine by me, one less thing to worry about, but it did
> seem worth exploring at first blush...  The suggestion of using it
> as a fallback when there are either no keys in DNS, or they don't
> work also seems like it could be viable. ]
>

I actually still need to fully digest in that thread. I hadn't even
realized when I sent this how much the two had in common, or I would have
acknowledged it in the mail. Sorry about that. I imagine my email probably
looked odd to you. I'm glad to see we had similar ideas!

There might be some version that works? We never came up with a formulation
we really liked, and the single-connection version made a lot of things
simpler. Some of the nuisances with doing it together:

- Sticking two full handshakes on the same connection introduces several
new key changes, which will frustrate QUIC and DTLS.

- Joining two handshakes at the ServerHello or so frustrates existing
analysis, split mode, and any servers with SNI-dependent cipher parameters.
(Everyone seems to keep asking their hosting providers for silly little
checkboxes to configure TLS parameters.)

David
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to