I have filed https://github.com/tlswg/tls13-spec/issues/1225 for this point.

On Tue, Mar 16, 2021 at 12:00 PM Ben Schwartz <bemasc=
40google....@dmarc.ietf.org> wrote:

> RFC8446 (and bis) currently describe a "cache timing" attack on use of
> Early Data:
>
>    *  Exploiting cache timing behavior to discover the content of 0-RTT
>       messages by replaying a 0-RTT message to a different cache node
>       and then using a separate connection to measure request latency,
>       to see if the two requests address the same resource.
>
> In fact, many users of TLS (e.g. HTTPS, DNS-over-TLS) are even more
> vulnerable to cache-based attacks:
> * The attacker can probe the cache without triggering a cache fill
> (Cache-Control: only-if-cached, RD=0)
> * The attacker can observe the remaining cache lifetime, which indicates
> when cache fill occurred (coincident with the replay or not), and when a
> resource will expire out of the cache (best time to try the attack).
>
> I think we should probably broaden the attack description. e.g.
>
>       *  Exploiting cache behavior to discover the content of 0-RTT
> messages
>          by locating a cache node that does not have a resource of interest
>          cached, replaying a 0-RTT message to it, and then using a separate
>          connection to check if the resource was added to the cache.
>
> I also wonder if we should strengthen the advice about replay defenses.
>
> --Ben Schwartz
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to