Hi Ben,

see my comments inline.

Generally you may read the closed issues or PRs with the proper keywords
in https://github.com/tlswg/dtls-conn-id.

FMPOV most stuff has been discussed over and over. For me, in many cases
there are not that strong arguments for the choosen option over the
others. But these discussion have been at that time. For now, I'm not
sure, if changing details will bring that benefit.
So, please, only address and change things, which are really important.

best regards
Achim Kraus

Am 04.09.20 um 01:02 schrieb Benjamin Kaduk:
Hi all,

Sorry for the slow processing time -- my queue is still longer than I am
happy with.

There's a few apparent inconsistencies that we'll need to tighten up,
but I don't think there's anything particularly problematic.
I made a PR for most of the editorial stuff:
https://github.com/tlswg/dtls-conn-id/pull/75
And having pulled the github repo up, it looks like there's a few open
issues and PRs still, there -- what's the status of those?


#73 FMPOV it's worth to address the issue Thomas found.
I would prefer a wording, which point to RFC6347, 4.1.2.1 and explain
not to use the option "If a DTLS implementation chooses to generate an
alert".

I wonder whether, as a rhetorical device, it would be helpful to give
the new record payload structure a new name (DTLSCIDCiphertext?) to
distinguish it from the RFC 6347 DTLSCiphertext.  Then we could write
things like "in order to distinguish between DTLSCiphertext and
DTLSCIDCiphertext", "the DTLSCIDCiphertext record format is only used
once encryption is enabled", etc.

Section 3

    For sending, if a zero-length CID has been negotiated then the RFC
    6347-defined record format and content type MUST be used (see
    Section 4.1 of [RFC6347]) else the new record layer format with the
    tls12_cid content type defined in Figure 3 MUST be used.

I'm glad that we take a clear stance on what content-type to use for
zero-length CIDs, though I forget what the reasoning was to fall this
way vs requiring that the tls12_cid ContentType is used whenever CIDs
are negotiated.  I see how this approach makes some processing easier
(there is always a CID present when the ContentType is used), but it
does have the drawback of requiring use of actual CIDs in order to
get encrypted content-type.  If you could remind me why this approach
was chosen, that will be helpful for subsequent discussions/IESG
review/etc.

There have benn some discussion about that, see

https://github.com/tlswg/dtls-conn-id/issues/22
https://github.com/tlswg/dtls-conn-id/issues/28

So, I'm also glad that in the end of the discussion there was a
consense. I'm not sure, but I think that comment

https://github.com/tlswg/dtls-conn-id/issues/28#issuecomment-458032109

made mainly the decission.



    For receiving, if the tls12_cid content type is set, then the CID is
    used to look up the connection and the security association.  If the
    tls12_cid content type is not set, then the connection and security
    association is looked up by the 5-tuple and a check MUST be made to
    determine whether the expected CID value is indeed zero length.  If
    the check fails, then the datagram MUST be dropped.

I guess there's maybe a risk that an attacker sets up a CID-ful
connection on a given 5-tuple and then disappears, thereby denying
the target of the attack the ability to use a CID-less DTLS association
on that 5-tuple.  But it would be hard to swamp all the ports, so it's
only likely to be an issue when fixed ports are used on both sides ...
which is known to happen sometimes.  Perhaps we should document this in
the security considerations.


I'm not sure, if I understand that well.
Do you assume, that in a network envirnoment, where the 5-tuple is not
stable, someone may use a CID and so block the (instable) 5-tuple? Yes,
but in that network your peer MUST anyway use new handshakes and so the
CID usage will be overwriten by the new handshake.
If the 5-tuples are stable, then the attack must spoof the 5-tuple, but
the hello verify mechanism will block that.

If I did't get it, it may be easier to discus this as issue in the
github repo.

    When receiving a datagram with the tls12_cid content type, the new
    MAC computation defined in Section 5 MUST be used.  When receiving a
    datagram with the RFC 6347-defined record format the MAC calculation
    defined in Section 4.1.2 of [RFC6347] MUST be used.

I guess that "4.1.2" includes "4.1.2.5 New Cipher Suites", so this is
not inadvertently closing off extensibility (not that we expect much in
the way of new 1.2 ciphersuites)...right?

The MAC calculation have also been discussed:
https://github.com/tlswg/dtls-conn-id/issues/25

If the CID is to be included into the MAC, then in my opinion, that must
be defined for each supported cipher suite.


Section 4

    When CIDs are being used, the content to be sent is first wrapped
    along with its content type and optional padding into a
    DTLSInnerPlaintext structure.  This newly introduced structure is

Is it worth mentioning that this is anlogous to the TLS 1.3
TLSInnerPlaintext?  (I do see that we have such a reference a couple
paragraphs later in the context of the record padding functionality.)

    enc_content  The encrypted form of the serialized DTLSInnerPlaintext
       structure.

In Section 5.2 we refer to the DTLSCiphertext.enc_content as
the intermediate encrypted stuff used as input to the MAC for
Encrypt-then-MAC processing, which maps up well to this description, but
is in conflict with DTLSCiphertext being the bits that actually go on
the wire.  So we seem to be internally inconsistent about whether
enc_content includes the EtM MAC.  Most likely it will be easiest to
address this in Section 5.2, though.

Section 5.x

        MAC(MAC_write_key, seq_num +

The TLS 1.2 notation is "seq_num" for the implicit sequence number, but
DTLS 1.2 says that the MAC input is the concatenation of the DTLS epoch
and the DTLS (explicit) sequence number.  I do not see this
concatenation given the name "seq_num" anywhere, so I think we need to
reformulate this expression.

            cid +
            cid_length +

Does this construction preserve injectivity?  It seems easier to reason
about when the length of an element is always before or always after the
element itself, but we put the length first for some of the other
fields (that appear after these) so there seems to be some malleability.

That order was also discussed a lot.
https://github.com/tlswg/dtls-conn-id/pull/29
I would prefer, if this is not changed again without strong arguments!


Section 6

    -  There is a strategy for ensuring that the new peer address is able
       to receive and process DTLS records.  No such test is defined in
       this specification.
    [...]
    Application protocols that implement protection against these attacks
    depend on being aware of changes in peer addresses so that they can
    engage the necessary mechanisms.  When delivered such an event, an
    application layer-specific address validation mechanism can be
    triggered, for example one that is based on successful exchange of
    minimal amount of ping-pong traffic with the peer.  Alternatively, an
    DTLS-specific mechanism may be used, as described in
    [I-D.tschofenig-tls-dtls-rrc].

I feel like these are supposed to be talking about the same thing, but
the first sentence of the latter paragraph leaves me confused.  Is the
idea that "application protocols that implement the functionality for
ensuring that the peer can receive and process DTLS records" are what
depend on being aware of the changes of address?


That should be at least one option. Using CoAP on the top of DTLS 1.2
with CID may used CoAP-feature to ensure, that the changed address is
valid, if a larger message is to be sent back at all.

Section 8

    With multi-homing, a passive attacker is able to correlate the
    communication interaction over the two paths and the sequence number
    makes it possible to correlate packets across CID changes.  The lack

DTLS 1.2 CIDs don't have CID changes (other than by rehandshaking, which
resets the sequence number space); the last clause seems stale from DTLS
1.3?

Section 9

We may want to reference draft-gont-numeric-ids-sec-considerations as it
relates to CID generation.

    An on-path adversary can create reflection attacks against third
    parties because a DTLS peer has no means to distinguish a genuine
    address update event (for example, due to a NAT rebinding) from one
    that is malicious.  This attack is of concern when there is a large

This is why we have the "[t]here is a strategy for ensuring that the new
peer address is able to receive and process DTLS records" requirement,
right?  We should probably mention that (and that it's not perfect,
since you have to send some records to the not-yet-verified peer address
as part of the verification process).

    asymmetry of request/response message sizes.

Is this just when the request is small and the response large, or is the
reverse scenario also of concern?

Section 10

    connection_id(TBD1) as described in the table below.  IANA is
    requested to add an extra column to the TLS ExtensionType Values
    registry to indicate whether an extension is only applicable to DTLS.

Do we want a "DTLS-Only" column or a "DTLS/TLS" column that takes values
"DTLS", "TLS", and "both"?

    IANA is requested to allocate tls12_cid(TBD2) in the "TLS ContentType
    Registry".  The tls12_cid ContentType is only applicable to DTLS 1.2.

We need a value for the "description" column, and should probably
explicitly say that it has DTLS-OK "Y".

Section 11.1

The way we refer to draft-tschofenig-tls-dtls-rrc does not actually seem
to require it to be a normative reference.

I'm sure we will catch some grief for normatively referring to both 5246
and 8446, but there's not really a way around it.

Thanks,

Ben

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to