On Fri, Apr 24, 2020 at 11:51 AM chris - <chrispat...@gmail.com> wrote:

>
> I don't think that's at all obvious. Again, the problem with the
>> pseudo-header is you are authenticating some abstract information, *not*
>> what is actually on the wire, and that allows the attacker to manipulate
>> what's on the wire undetected. We have no analysis for the impact of that.
>>
>
> Yes, this is the way I see it. I think you can get by with implicitly
> authenticating things, but when you start doing this, the details of how to
> decode the data on the wire begin to really matter for the proof (and
> potentially for an attacker). This can get complicated if, as you say, the
> header's content is highly variable. So, I would recommend authenticating
> what's on the wire. I don't think it would hurt to authenticate more than
> this, e.g., other fields that the sender and receiver need to agree on.
>

FWIW, if the consensus of the group were to authenticate both the
"pseudoheader information" and the bits on the wire, I could potentially
live with that.

My rank ordering of options I consider potentially acceptable is:

1. Ban implciit CIDs.
2. Authenticate both the wire format and the abstract information.

I am strongly opposed to authenticating only the abstract information.

-Ekr

P.S. QUIC uses the same implicit length mechanism, so we should form a
common theory.


> Chris P.
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to