Hiya,

Interesting question...

On 11/01/2024 00:07, Christian Huitema wrote:
I am wondering what the proper fix should be.

I don't know the answer (or if there's one answer) but
suspect that it may be better to first explore various
scenarios (as you've kinda kicked off with forwarding to
the deepspace list) and then come back to TLS implementers
with an ask based on some of those.

I also suspect that one'd need to use some kind of callback
that e.g. can query ephemeris data, as a number of scenarios
would involve RTTs that vary significantly over time, but
adding such callbacks to implementations could be dangerous
in more typical Internet environments.

Lastly, I'd guess that replay of early_data for applications
in some deepspace scenarios would be so dangerous that one'd
be better to not use early_data but rather to export a key and
then use that with an application that itself knows how to handle
replayed data. So maybe exploring ways to use key exporters is
also something to consider, rather than using early_data. (For
cases where new deepspace applications are developed that want
to use TLS.)

Cheers,
S.

Attachment: OpenPGP_0xE4D8E9F997A833DD.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to