On Thu, Nov 14, 2019, at 7:50 AM, Daniel Migault wrote:
> Hi,
> 
> The current version is clearer than the previous one. However, as I
> understand the document, it still seems very asymmetric in the sense
> that it does not provide the client the ability to enforce a number. I
> believe more guidances/specifications are needed on how to interpret the
> count value. Interpretation is usually based on implicit assumptions of
> today's usages, and explicit signaling should, in my opinion, be preferred. In
> other words, I believe that long term interop will benefit from these
> additional specifications.

I disagree with this assessment. The document is clear on this:

   A supporting server MAY use TicketRequestContents.count when
   determining how many NewSessionTicket messages to send to a
   requesting client, and SHOULD place a limit on the number of tickets
   sent.  The number of NewSessionTicket messages sent SHOULD be the
   minimum of the server's self-imposed limit and
   TicketRequestContents.count.

As has been stated before, the count is a *hint* to the server, nothing more. 

> The problem stated in the introduction is that the server needs some
> information from the client in order to generate the appropriated number
> of tickets. In fact the client is likely to be the one that better knows
> the number of tickets to be generated, but the current text does not
> enable the client to enforce that number. Instead this is entirely left
> to the server.

As above, I think you're misunderstanding the point of this document. Ticket 
requests are hints to servers.

> Typically, if a device does not want to have more than one ticket. It
> should be able to indicate one and be sure it will only receive one
> ticket. The current specification does not prevent multiple tickets to
> be sent by the server. 

Right, nor should it. Again, that's not a goal.

> The server can ignore the count value (MAY) even 
> though it is known to support the extension. This means that a server
> could support the extension while still having a hard coded number of
> tickets. In addition, (SHOULD) let the server determining the number of
> tickets. 
> 
> Possible ways to address my concerns could be to limit the count value
> to the number of tickets generated during the KEX, and a server MUST NOT
> exceed the counter value. The text would need more guidance on how the
> server SHOULD behave when emitting at different time in the KEX - after
> the Finished message and after the post handshake authentication.

I don't think any text changes are needed to address these comments.

> The security consideration should in my opinion consider the fact that a
> client over UDP/DTLS may use the count value as an amplification factor 
> to have the server flooding a target. The current text only seems to
> consider the computation aspect, not the bandwidth. If that cannot
> happen, it might be beneficial to add it. However, when a server sends
> tickets right after the Finished, it seems to me that can be used as an
> attack.

I'm not convinced this is useful to add. The target here is the client 
(attacker) that requested tickets. 

Best,
Chris

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to