This question should go to the TLS mailing list, not to
architecture-discuss. I have CCed that list.

On Fri, Dec 9, 2022 at 3:02 AM Kristijan Sedlak <xpeperm...@gmail.com>
wrote:

> Hello, everyone.
>
> I'm scratching my head on RFC 9146 and wonder about the correct
> implementation strategy. Connection IDs in DTLS 1.3 are not mandatory and
> thus leave related challenges to the implementor.
>
> As I understand DTLS 1.3 allows endpoints to choose whether to support
> ConnectionId extension or not. If the sender includes ConnectionId
> extension in the ClientHello, the receiver knows that CIDs are supported
> and it can include its CID in the ServerHello, but if the receiver does not
> support the extension it will not include it in the ServerHello and the
> sender will get that info.
>
> What should we do if an endpoint features depend on CIDs but the targeting
> peer does not support the CID extension? Let's say that the sender will
> reuse the socket (ip:port) and serve multiple standalone "connections"
> through it (N ClientHello messages will start N connections over the same
> socket and the peer needs to use CIDs to distinguish between them) and thus
> require the remote endpoint to support CIDs? Should an endpoint (sender or
> receiver) that requires CIDs reply with unsupported extension alert?


If you need connection ids and the peer doesn't support them, you should
probably
terminate the connection with a "handshake_failure" alert. Alternately, you
could
only allow one connection at a time.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to