Hi Éric, thanks a lot for your review and comments.

Please see the replies below and let us know what you think.

cheers!

On Thu, Jul 03, 2025 at 05:11:45AM +0100, Éric Vyncke via Datatracker wrote:
----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------
## DISCUSS (blocking)

### Section 6.2

In the case of NAT rebinding, how can a responder behind a NAT detect
that its external address/port has changed as seen by the initiator:
it still receives the other peers packet sent to its unchanged
address/port ? What am I missing ?

This could probably be addressed by some more text before `The action
to be taken depends on whether or not the path through which the
message was received is still the preferred one`.

This looks very similar to Med's comment "Impossibility to adhere with a
MUST".

Can you please have a look at the discussion (sub)thread at [1] and the
proposed fix [2]?

If we are lucky we may have already solved this :-)

[1] https://mailarchive.ietf.org/arch/msg/tls/JyslZqlHwQFdCo0mmBiQvo_6wmI/
[2] https://github.com/tlswg/dtls-rrc/pull/97/commits/03935ba17

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

## COMMENTS (non-blocking)

### FATT process ?

Out of curiosity, I still wonder what `FATT process` and `FATT review` mean in
the shepherd write-up.

FATT is TLS's formal analysis triage panel.  See [3].

[3] https://github.com/tlswg/tls-fatt/tree/main

### Use of "path"

Probably too late to change, but the choice of "path" rather than "anchor" or
"socket" (or something else) is poor... the actual path (the set of network
links and devices) keeps changing in an IP network.

Yes, in hindsight I can see that this wasn't an ideal choice.  It seems
a bit too late now to go back and do a terminology revamp.  Hopefully,
this won't create too much confusion.

### Section 1

A small graphical (packet exchange) would be useful even if the text is clear.

Perhaps we could add a forward link to the "Example" section.

### Section 3

What is the expected server behavior when the client sends the rcc extension
without offering the connection_id extension ? Is the whole handshake stopped
or is the option ignored ? Please be specific.

The server will not echo the rrc extension.

### Section 4

Probably due to my lack of familiarity with the used syntax, but it seems that
the enum part is not really part of the figure 1 legend of `Return Routability
Check Message`. It seems more like an addition to TLS Content Type registry.
Suggest to split this figure in two figures with 2 distinct legends.

I like the fact that all the relevant TLS presentation language is
packed together.  Rather than splitting the figures, I'd slightly extend
the legend to read "Return Routability Check Message and Content Type".

### Section 5

s/has faster routing/has faster forwarding/ ?

In the editor's copy we currently have "faster fowarding path".  Would
that work for you?

### Section 5.1.1

Related to `the original packet still reaches the intended destination`, does
this mean that an attacker can prevent rebinding to a new address/port by
sending the packet from the 'old' address/port ?

Not really.  We assume that an attacker does not posses the session key
material necessary to forge a valid path_response that would convince
the peer to rebind.

### Section 5.2.1

What is "AP" in figures 5 and 6?

Access Point.

### Section 10.2

As this section ends with a recommendation, should it clearly be in
the protocol specification part rather than in operational
considerations ?

Another approach might be to provide more context for the
recommendation.  For example:
"Therefore, when using RRC in DTLS 1.2 *and middlebox interference is a
 concern*, it is recommended that CID is enabled in both directions."

t

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to