On Wed, Jan 5, 2022 at 7:18 PM Martin Thomson <m...@lowentropy.net> wrote:

> These are both disruptive changes, but I agree that they are OK in
> principle.
>
> I have a few questions on #257.  Those are on the PR, but I'll repeat them
> here:
>
> Many implementations of DTLS use a 16-bit integer to hold epoch.
> Sometimes, that leaks into places that mean that it is hard to change.
>
> Those of us with this problem can probably pull the same trick as here and
> only expose the low 16 bits, but would it be possible to implement this
> without allowing key updates that take epoch to 2^16?
>
> If the epoch can have 64 bit values, then why not allow for the full range
> of values to be used? Is there an analysis that suggests that rekeying too
> often leads to this problem?


 As noted in the PR, if you rekey on the order of 2^64 times you run a
significant risk of collisions in the key. The randomized IV is intended to
ameliorate this, but I prefer to be safe, especially as there is no
plausible scenario in which you would need to do 2^{48} rekeys.


  (Similarly, the 2^48 limit on the sequence number makes little sense in
> this context.)
>

Agreed. That's just holdover from the combined sequence number. I didn't
realized I had missed it. Can you point to the relevant location and I'll
fix.


>
> It would be good to highlight the fact that #262 can result in transcript
> collisions between DTLS and TLS (with the exception of maybe
> supported_versions because we're now using the inverted encoding ...for no
> good reason?  or for this specific reason?).
>

Well, in part for this reason, yes.


> However, even though the transcript that is input to HKDF might be the
> same, true problems arising from a collision are avoided because all key
> derivations use a different label with HKDF.  That means that we depend on
> using HKDF-Expand-Label for key diversity between DTLS and TLS, so any use
> of keys in either protocol has to pass through at least one invocation of
> that function.  Only the early secret doesn't meet this condition, so I'm
> not worried, but it needs to be noted (and it isn't).
>

It seems like the note ought to say that the transcripts are separable by
the version, no?

-Ekr


> On Thu, Jan 6, 2022, at 13:34, Christopher Wood wrote:
> > Hi folks,
> >
> > As discussed during IETF 112, there are two outstanding DTLS 1.3 issues
> > with proposed resolutions:
> >
> > - https://github.com/tlswg/dtls13-spec/pull/257: This resolves the
> > epoch limit issue. It received external review from cryptographers and
> > the authors have confidence in the change.
> > - https://github.com/tlswg/dtls13-spec/pull/262: This aligns the DTLS
> > 1.3 transcript with that of TLS 1.3.
> >
> > We'd like to run a brief consensus call on these proposed resolutions.
> > Please chime in if you'd like to see changes of any kind. Absent
> > objections, we'll merge them and proceed with the remaining RPC edits.
> >
> > This call will close on Friday, January 14.
> >
> > Best,
> > Chris, for the chairs
> >
> > _______________________________________________
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to