Thanks for taking the time to read and respond to my queries, my understanding of this protocol is incomplete, but I am working hard to remedy that.

On 09/02/17 19:05, Ilari Liusvaara wrote:
On Thu, Feb 09, 2017 at 12:38:50PM -0000, Mark Dunn wrote:
I am reading your TLS 3.1 Standard and the mailing list.

It looks great.

I am particularly interested in using the 0-RTT feature for IoT timestamped
data, which would seem immune from replay attacks

I have a couple of questions

1) The maximum ticket lifetime is set to 7 days. Is this based on hard
science or arbitrary?

If it is arbitrary then 8 days for weekly intervals or 32 for days for
monthly intervals would  make better commercial sense

                (allowing for variability in wake-up times for constrained
devices)
AFAIK, it is arbitrary. However, long validity periods bring security
issues, with having to store and protect symmetric keys for a long
time.
If it IS arbitrary, could we have a recommendation rather than a

"Servers MUST NOT use any value more than 604800 seconds (7 days)"
2) Have you considered using TLS for a generic network layer?
Note that TLS requires in-order reliable delivery (DTLS doesn't, but
DTLS 1.3 is currently just handwaving), and neither is available below
transport layer.


-Ilari

Yes DTLS, of course you are correct. I will try and rephrase my questions.

I understand "TLS 1.3 requires in-order reliable delivery", but of course, if the protocol relies on in-order reliable data delivery then it cannot be secure. The protocol must assume the opposite in fact, that an attacker will break boththose requirements in every way possible. As the TLS 1.3 protocol seems to have been tested(designed) against a formal state machine then clearly someone agrees with me.


If the protocol's responsibility is to secure the application data from the insecure world of the Internet

Application | TLS :| TCP | IP | <-------------------------------------------> | IP | TCP |: TLS | Application
\----------------------------------\/---------------------------------/
                                                Insecure Internet

then the protocol cannot rely on the TCP handshake, neither can it rely on TCP's packet ordering. It would seem TCP is largely redundant as IP does the fragmentation and re-assembly.
TCP's only role seems to be to hold open the NAT on a firewall!

Which is why when I look at this protocol, I overlook the ordered data in-session ability of TLS ( /head/-of-line blocking.. blah, blah)and in my blinkered view see the resumption/0-RTT ability as DTLS. Any protocol which uses IP directly (including TCP) is responsible for reliable data delivery whether it is as simple as an ack/nack/retry or uses the sophisticated windowing etc. of TCP. If these protocols sat on (D)TLS then each of these protocols would drive their reliable delivery through the TLS state machine. *(this is exciting)*

So, for example if TCP relied on TLS instead of the other way around then TCP would be protected under TLS's umbrella of security.

Application | TCP | TLS | IP | <-------------------------------------------> | IP |: TLS | TCP | Application
\----------------------------\/---------------------------/
                                                Insecure Internet

TCP's sliding window would work, but the syn/syn-ack/ack handshake would be sub-optimal again as early data is not available during authentication.
(D)TLS key changes look like they would happen seamlesslyunderneath.

For the Machine to Machine (or Internet of Things) world however, things look much rosier (to me) as "Machines Don't Browse!".
Once the server/client authentication handshake is complete:

1) is it possible to use"resumption" as a three way handshake to securely deliver a single packet 2) Is it possible to use "0-RTT" as a mechanism to deliver a single packet (if slightly less securely)

Thinking this through (slightly) more carefully now, It would not be possible to place (D)TLS between the IP layer and Ethernet Layer as Ethernet does not have fragmentationand re-assembly 3) Do you agreethat securing virtualisation with (D)TLS should be possible (Application / TCP / IP / VXLAN / (D)TLS / IP) 4) Do you think wireless protocols are candidates as many wireless protocols have small packets and perform fragmentation/re-assembly.





_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to