> On May 3, 2017, at 9:15 PM, Martin Thomson <[email protected]> wrote:
> 
> Let's get the fallacy out of the way.  TLS 1.3 provides protection
> against replay attacks, just not if you decide to use 0-RTT.

Amen.

> I realize that there is a real risk that this distinction will be lost
> on some, but I can fairly confidently say that it isn't lost on those
> who are considering its use in various protocols.  For instance, I've
> spoken to someone who is looking at XMPP seriously and the advice
> there is pretty close to *don't* use 0-RTT.

One obvious use case for 0-RTT is DNS queries.  The query protocol is
idempotent, and latency matters.  So for DNS over TLS, 0-RTT would be
a good fit.   TLS session caches are not attractive on the DNS server
given the enormous query volumes, but STEKs would be a good fit.

-- 
        Viktor.

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to