> If the client is trying to perform 
> some sort of attack on the server by re-sending an old cookie, I assume 
> that a prerequisite for this attack is that the TLS handshake succeeds.

Maybe you don't need the handshake to succeed?  As a non-cryptographer
I can't say what the implications might be (as I said to Watson in private
email) but some of you are crypto people.  If you can create N parallel
sessions using the same cookie (send the same ClientHello1 with the
same Random value (?), or maybe trick a poorly-written server by sending
an initial ClientHello1 containing a cookie extension, or use DTLS (?)), what
could you do as a malicious client?  I don't know the answer, I'm asking.

Mike

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to