Hi Chris,

Thanks for the responses, please see my comments inline.

Yours,
Daniel

On Thu, Nov 14, 2019 at 11:02 AM Christopher Wood <c...@heapingbits.net>
wrote:

> On Thu, Nov 14, 2019, at 7:50 AM, Daniel Migault wrote:
> > Hi,
> >
> > The current version is clearer than the previous one. However, as I
> > understand the document, it still seems very asymmetric in the sense
> > that it does not provide the client the ability to enforce a number. I
> > believe more guidances/specifications are needed on how to interpret the
> > count value. Interpretation is usually based on implicit assumptions of
> > today's usages, and explicit signaling should, in my opinion, be
> preferred. In
> > other words, I believe that long term interop will benefit from these
> > additional specifications.
>
> I disagree with this assessment. The document is clear on this:
>
>    A supporting server MAY use TicketRequestContents.count when
>    determining how many NewSessionTicket messages to send to a
>    requesting client, and SHOULD place a limit on the number of tickets
>    sent.  The number of NewSessionTicket messages sent SHOULD be the
>    minimum of the server's self-imposed limit and
>    TicketRequestContents.count.
>
> As has been stated before, the count is a *hint* to the server, nothing
> more.
>
> That is my point, in my opinion a hint is under specified.


> > The problem stated in the introduction is that the server needs some
> > information from the client in order to generate the appropriated number
> > of tickets. In fact the client is likely to be the one that better knows
> > the number of tickets to be generated, but the current text does not
> > enable the client to enforce that number. Instead this is entirely left
> > to the server.
>
> As above, I think you're misunderstanding the point of this document.
> Ticket requests are hints to servers.
>
> On the contrary, I think I understood it correctly.


> > Typically, if a device does not want to have more than one ticket. It
> > should be able to indicate one and be sure it will only receive one
> > ticket. The current specification does not prevent multiple tickets to
> > be sent by the server.
>
> Right, nor should it. Again, that's not a goal.
>
> > The server can ignore the count value (MAY) even
> > though it is known to support the extension. This means that a server
> > could support the extension while still having a hard coded number of
> > tickets. In addition, (SHOULD) let the server determining the number of
> > tickets.
> >
> > Possible ways to address my concerns could be to limit the count value
> > to the number of tickets generated during the KEX, and a server MUST NOT
> > exceed the counter value. The text would need more guidance on how the
> > server SHOULD behave when emitting at different time in the KEX - after
> > the Finished message and after the post handshake authentication.
>
> I don't think any text changes are needed to address these comments.
>
> > The security consideration should in my opinion consider the fact that a
> > client over UDP/DTLS may use the count value as an amplification factor
> > to have the server flooding a target. The current text only seems to
> > consider the computation aspect, not the bandwidth. If that cannot
> > happen, it might be beneficial to add it. However, when a server sends
> > tickets right after the Finished, it seems to me that can be used as an
> > attack.
>
> I'm not convinced this is useful to add. The target here is the client
> (attacker) that requested tickets.
>

The target is the spoofed source IP address.

>

>  Best,
> Chris
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to