Hi Éric, thanks a lot for your review and comments. Please see the replies below and let us know what you think.
cheers! On Thu, Jul 03, 2025 at 05:11:45AM +0100, Éric Vyncke via Datatracker wrote:
---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- ## DISCUSS (blocking) ### Section 6.2 In the case of NAT rebinding, how can a responder behind a NAT detect that its external address/port has changed as seen by the initiator: it still receives the other peers packet sent to its unchanged address/port ? What am I missing ? This could probably be addressed by some more text before `The action to be taken depends on whether or not the path through which the message was received is still the preferred one`.
This looks very similar to Med's comment "Impossibility to adhere with a MUST". Can you please have a look at the discussion (sub)thread at [1] and the proposed fix [2]? If we are lucky we may have already solved this :-) [1] https://mailarchive.ietf.org/arch/msg/tls/JyslZqlHwQFdCo0mmBiQvo_6wmI/ [2] https://github.com/tlswg/dtls-rrc/pull/97/commits/03935ba17
---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- ## COMMENTS (non-blocking) ### FATT process ? Out of curiosity, I still wonder what `FATT process` and `FATT review` mean in the shepherd write-up.
FATT is TLS's formal analysis triage panel. See [3]. [3] https://github.com/tlswg/tls-fatt/tree/main
### Use of "path" Probably too late to change, but the choice of "path" rather than "anchor" or "socket" (or something else) is poor... the actual path (the set of network links and devices) keeps changing in an IP network.
Yes, in hindsight I can see that this wasn't an ideal choice. It seems a bit too late now to go back and do a terminology revamp. Hopefully, this won't create too much confusion.
### Section 1 A small graphical (packet exchange) would be useful even if the text is clear.
Perhaps we could add a forward link to the "Example" section.
### Section 3 What is the expected server behavior when the client sends the rcc extension without offering the connection_id extension ? Is the whole handshake stopped or is the option ignored ? Please be specific.
The server will not echo the rrc extension.
### Section 4 Probably due to my lack of familiarity with the used syntax, but it seems that the enum part is not really part of the figure 1 legend of `Return Routability Check Message`. It seems more like an addition to TLS Content Type registry. Suggest to split this figure in two figures with 2 distinct legends.
I like the fact that all the relevant TLS presentation language is packed together. Rather than splitting the figures, I'd slightly extend the legend to read "Return Routability Check Message and Content Type".
### Section 5 s/has faster routing/has faster forwarding/ ?
In the editor's copy we currently have "faster fowarding path". Would that work for you?
### Section 5.1.1 Related to `the original packet still reaches the intended destination`, does this mean that an attacker can prevent rebinding to a new address/port by sending the packet from the 'old' address/port ?
Not really. We assume that an attacker does not posses the session key material necessary to forge a valid path_response that would convince the peer to rebind.
### Section 5.2.1 What is "AP" in figures 5 and 6?
Access Point.
### Section 10.2 As this section ends with a recommendation, should it clearly be in the protocol specification part rather than in operational considerations ?
Another approach might be to provide more context for the recommendation. For example: "Therefore, when using RRC in DTLS 1.2 *and middlebox interference is a concern*, it is recommended that CID is enabled in both directions." t _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org