On Thu, Jan 11, 2024, at 18:38, Christian Huitema wrote:
> If an implementation does not want to deal with the extra complexity, 
> then having a way to plug in some extra code for a specific scenario 
> makes sense...

My point was that the handling does not need to be complex, only the tolerance 
for time variation needs to be.  Tolerance is driven by two things: RTT and 
clock variations.  But - critically - that tolerance needs to be uniformly 
managed across the entire set of clients.  If you have clients that have very 
tight variance on timing, you can use a narrow window, but you risk excluding 
those with high variance.  If you want to allow for high variance, you spend 
more in doing so, largely by having to track more 0-RTT attempts over a wider 
window of time.

You can't selectively change that tolerance.  Otherwise, an attacker looking to 
exploit replay can choose whichever per-client reaction suits them best.

I'm assuming this is a DoS attack, I can't see how you would exploit this to 
mount a replay, though you might choose an option with false negatives on 
replay detection ... you shouldn't.  All of the distributed systems challenges 
that apply shouldn't be affected by long RTT unless you start increasing the 
distance between nodes that share 0-RTT state in ways that could be exploitable 
(note: do not do this, sharing state between collocated nodes is already risky 
enough).

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to