Re: [quicwg/base-drafts] Encrypting Retry token (#3274)

Kazuho Oku <> Tue, 10 December 2019 00:32 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id CF486120288 for <>; Mon, 9 Dec 2019 16:32:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.382
X-Spam-Status: No, score=-6.382 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id txDyK3CP56WS for <>; Mon, 9 Dec 2019 16:31:59 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 7394912021C for <>; Mon, 9 Dec 2019 16:31:59 -0800 (PST)
Date: Mon, 09 Dec 2019 16:31:58 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=pf2014; t=1575937918; bh=Jmvqw0dBUN/142StCG7UU2V1jGNlhZh4oXMdhXFtswo=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=GMjpblI51V4FMsvzF9WBHHku7W7v62MX5WAtRMDvqwa3jU/bFcpYWGc6ScH33+vVd jTRTMZgMt7MAPtsJwyOrb+uzLrcVQGvp5F/yinpWKORj4GwQKdH1Frt8ScwisSfvhM ik/8DKILMv0xThP05pmpPjyoyeYqYYuun0E1Dhcc=
From: Kazuho Oku <>
Reply-To: quicwg/base-drafts <>
To: quicwg/base-drafts <>
Cc: Subscribed <>
Message-ID: <quicwg/base-drafts/issues/3274/>
In-Reply-To: <quicwg/base-drafts/issues/>
References: <quicwg/base-drafts/issues/>
Subject: Re: [quicwg/base-drafts] Encrypting Retry token (#3274)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5deee77e102e9_747d3fc69e0cd95c10628c"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: kazuho
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
Archived-At: <>
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 10 Dec 2019 00:32:01 -0000

My +1 goes to just doing GMAC, due to the reasons others have laid out.

I'd also note that it is unlikely that middleboxes will ossify on the fact that the values of the token fields in Retry and Initial packets are equivalent, based on the behavior those developers see on the wire. This is because Retry is expected to be used *only* when there is an attack. Or, if those developers read the spec, the token will get ossified regardless of if it's encrypted in the Retry packet.

You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub: