FWIW, I did not read Watson's comment in any negative way and agree with
him. (And everyone else. I think my feelings are "meh, let's just fix it"
and "sure, whatever we can get".)

Not to say that every implementor would have noticed every issue (I'm sure
I overlooked some issues too), but I think DTLS's biggest challenge has
always been the relatively little attention it receives compared to TLS.
This is exacerbated by the kinds of things we need attention on. While the
security, cryptography, and handshake bits (this WG's forte), more-or-less
carry over as-is, it picks up a whole mess of transport-related concerns
that just don't apply to TLS. And then there's also a wide range of
possible implementations, depending on the simplifying assumptions you make
(e.g. refusing to have multiple outgoing post-handshake flights active at
once). That, in turn, means that a reader might not have bothered thinking
about the more complex case, if they didn't mean to implement it. (On my
end, I don't expect we'll implement everything in here either!)

While I think this WG's analysis (formal and otherwises) are mostly on
security properties, the issues I found are mostly making sure the protocol
can make forward progress under packet loss/reordering. But also whether
the text sufficiently defines the protocol at all. For example, it's quite
common for DTLS implementations to take these simplifying assumptions, but
all that actually needs to be written down as allowed behavior, because it
means that, when we analyze the protocol, receivers must accommodate a
sender that, say, artificially block sending one flight on the ACK of
another one.

The remedy for all that is, well, more eyes on it, which we get by having
the WG take on a bis document. :-) Beyond that, whether we need
implementers, formal analysis, or just people reading and reasoning through
the draft, I think we just welcome anyone who is interested in doing that
work and go forth. All three sources of feedback ultimately involve a human
reading the document and trying to understand what it's trying to say
anyway, which I think is the biggest gap here. Once we even know what our
protocol is, if there are folks available to model that and formally check
a forward-progress property (rather than a security property), awesome! If
not, we can resort to traditional "think very hard about it" techniques. I
don't think we need to preemptively worry about which options we'll have
available when we get there.

On Wed, Nov 13, 2024 at 12:10 PM Andrei Popov <Andrei.Popov=
40microsoft....@dmarc.ietf.org> wrote:

> David’s analysis is excellent; as a likely future implementor of DTLS 1.3
> I’m glad these spec bugs have been discovered. To what extent formal
> analysis would be helpful here is not obvious.
>
>
>
> I don’t recall: did we have interoperable implementations prior to
> shipping the DTLS 1.3 spec?
>
>
>
> Cheers,
>
>
>
> Andrei
>
>
>
> *From:* Muhammad Usama Sardar <muhammad_usama.sar...@tu-dresden.de>
> *Sent:* Wednesday, November 13, 2024 3:30 AM
> *To:* Watson Ladd <watsonbl...@gmail.com>; Russ Housley <
> hous...@vigilsec.com>
> *Cc:* Joseph Salowey <jsalo...@gmail.com>; IETF TLS <tls@ietf.org>
> *Subject:* [EXTERNAL] [TLS] Re: DTLS 1.3 bis
>
>
>
> On 12.11.24 23:52, Watson Ladd wrote:
>
> I think anyone implementing would have discovered them.
>
> Is David Benjamin the *first* and *only* person in the world implementing
> DTLS 1.3? If not, why were others not able to discover those issues? So, I
> think we should be thankful to him for his careful analysis rather than
> giving statements like the above devaluing his work.
>
> From a formal perspective, I find his work insightful. In the formal
> analysis, we typically do not model KeyUpdate part. My takeaway was that we
> need to include that as well.
>
> Regards,
>
> Usama
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to