Re: [quicwg/base-drafts] Forgery limits on packet protection (#3619)

Martin Thomson <> Fri, 01 May 2020 21:58 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 076AE3A15D8 for <>; Fri, 1 May 2020 14:58:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.374
X-Spam-Status: No, score=-2.374 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_IMAGE_ONLY_20=1.546, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_MSPIKE_H2=-0.82, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id p8RM8Ty-f-KD for <>; Fri, 1 May 2020 14:58:02 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id B058C3A15D9 for <>; Fri, 1 May 2020 14:58:02 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 4B961521D82 for <>; Fri, 1 May 2020 14:58:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=pf2014; t=1588370281; bh=bF4vEZ9XlEddQBQ9+uCFcSI3o8uqNVjZyMjv+XQ1qJ4=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=zVc/in7s6AHLSV+SM4LeMIogaLsBOMKJ8D1dsZbHDr9Iu8sb4YJ5kyk9zBQFQvloe sObmCjQaWGunBve2th9vOjSOuoMC9fv6g4lbh/qwP3U4LM+grgK2cVDL7AE91KlO07 wKUSnw5zQR4Yscokh1Jlv9kn6PVGRAdKJrf6ETgE=
Date: Fri, 01 May 2020 14:58:01 -0700
From: Martin Thomson <>
Reply-To: quicwg/base-drafts <>
To: quicwg/base-drafts <>
Cc: Subscribed <>
Message-ID: <quicwg/base-drafts/issues/3619/>
In-Reply-To: <quicwg/base-drafts/issues/>
References: <quicwg/base-drafts/issues/>
Subject: Re: [quicwg/base-drafts] Forgery limits on packet protection (#3619)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5eac9b693c981_422f3fb0012cd9682036a9"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: martinthomson
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
Archived-At: <>
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 01 May 2020 21:58:06 -0000

(Tentative) good news on CCM: Kenny identified a security analysis paper and it seems relatively simple to go from that to numbers.

I am not personally concerned about support for key update. 9/15 isn't 15, but that doesn't bother me. It turns out to be a little fiddly to implement, so if people decide to drop connections that hit these limits instead, the effect isn't that bad. Of course, if you want to follow Nick's suggestion, that works too (I remember Dan Bernstein seriously suggesting a cipher that updated every record, back when I first proposed this scheme for TLS).

You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub: