Re: [TLS] 0-RTT in DTLS 1.3
Martin Thomson <mt@lowentropy.net> Sun, 23 May 2021 23:58 UTC
Return-Path: <mt@lowentropy.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id B4CF03A093D
for <tls@ietfa.amsl.com>; Sun, 23 May 2021 16:58:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001,
RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001,
URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=lowentropy.net header.b=SPhBJx+m;
dkim=pass (2048-bit key)
header.d=messagingengine.com header.b=vk3myaSf
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id fwNFrgxNznmA for <tls@ietfa.amsl.com>;
Sun, 23 May 2021 16:57:57 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com
[66.111.4.26])
(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 1128B3A093C
for <tls@ietf.org>; Sun, 23 May 2021 16:57:56 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44])
by mailout.nyi.internal (Postfix) with ESMTP id E31085C0174
for <tls@ietf.org>; Sun, 23 May 2021 19:57:53 -0400 (EDT)
Received: from imap10 ([10.202.2.60])
by compute4.internal (MEProxy); Sun, 23 May 2021 19:57:53 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net;
h=mime-version:message-id:in-reply-to:references:date:from:to
:subject:content-type; s=fm2; bh=GnxIgfSDwbQ/tGR4SEm/4fvZY7SWUrF
LEjbdCYyyFtQ=; b=SPhBJx+mpVQIDjoxqRbrIKfhdNGQ9XbgJ/mWfV/fv4IPudL
I+t1LVbmKjt37uh1uRDeiyp5NIDbyBJyUD1/bfGJGEu7GLVQ4k8ZQsr0RP99lXq7
R8MKXIOnEIJxI+UHbN4Hf9eiLWiCgbXo97EkDQgNLnN/zwAFNzJd6p74WH7slKoy
j2oLZYLv4CQAYL3gnpIsr1xc4K7IOzm8II1Wpf3xYtXll3jDrzoAalXBIGbozKkC
L+xKu0IoOfdyex8v2r+8mCAflmM+9PbRCSlkBKjBsczolsRw9ETrBHRWCJNbuSKr
fWsWW/UDNZ4ysc6LIkr1YQK/5bM+pQxNKDBIezA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
messagingengine.com; h=content-type:date:from:in-reply-to
:message-id:mime-version:references:subject:to:x-me-proxy
:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=GnxIgf
SDwbQ/tGR4SEm/4fvZY7SWUrFLEjbdCYyyFtQ=; b=vk3myaSf1IN6l/PrD3CWF6
rtIxifcz4k/eK/7F9TVJl0nAAt06ktpYETmwTCqvZfplKttVSPBUOpSKQmFIvymy
evybu9ueF+Nnc/dna/JwlgOyM38KZ3PtbcLCcgKEanAc30IAAILWGJwtwsBpUcvz
7wvsVqPoY3wtMSDEtL9lKufDaCw881Qu6BZ9FmgfZpeFmVAN8zfC0gJ+D7y4MZ1J
gDGE/kmsCEjfuPJqzCdr0pCHRki+TcHxeqsyyXFItTJPhRIoODR8A4M3hchVTzxZ
RAeomqUXCxcq+BdkK+Hi5lxzyHSkAySNU2kK8nHotrpbk9aobLXcAWh/uPb9ny1Q
==
X-ME-Sender: <xms:AeyqYHx4fut4jo-LDyzX3gz7Tj9QPFwKb0M2kmREQpeL9ho-lJMvXA>
<xme:AeyqYPTQXsftMwNcO8iu7TLFLJ9ZE-xmMpyX5k0KHsblFUbmT7YTcEGEGlm0bBP4v
u3AT9f1kp-8SqDJfM4>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdejjedgudeghecutefuodetggdotefrod
ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh
necuuegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgesth
dtredtreertdenucfhrhhomhepfdforghrthhinhcuvfhhohhmshhonhdfuceomhhtsehl
ohifvghnthhrohhphidrnhgvtheqnecuggftrfgrthhtvghrnhepkeetueeikedtkeelfe
ekvefhkeffvedvvefgkefgleeugfdvjeejgeffieegtdejnecuvehluhhsthgvrhfuihii
vgeptdenucfrrghrrghmpehmrghilhhfrhhomhepmhhtsehlohifvghnthhrohhphidrnh
gvth
X-ME-Proxy: <xmx:AeyqYBWIakOaDhhzInd1EJ4kM-w3jMUtR4uUjU7JDJ2Vgk-nskhuLQ>
<xmx:AeyqYBg73lg1wReYtm9RTr3eLeaUuDugYbUuynQ2KJ0n_gwdZjkTkA>
<xmx:AeyqYJB9GgZWywwfnK6VqBj-hE91xPXRzFNymFYeH-Hq0-ehx4CqsA>
<xmx:AeyqYMP2XuJM9kssgA3P_8rpzjWSBeFHa3ic8bqZ_i9VIj9zrfj5Ag>
Received: by mailuser.nyi.internal (Postfix, from userid 501)
id 938804E0091; Sun, 23 May 2021 19:57:53 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.5.0-alpha0-448-gae190416c7-fm-20210505.004-gae190416
Mime-Version: 1.0
Message-Id: <a2bae4a5-66b8-49db-8fb5-3993f593e64a@www.fastmail.com>
In-Reply-To: <PAXPR08MB7169693DFFA1D93B35B8D9039B279@PAXPR08MB7169.eurprd08.prod.outlook.com>
References: <PAXPR08MB7169693DFFA1D93B35B8D9039B279@PAXPR08MB7169.eurprd08.prod.outlook.com>
Date: Mon, 24 May 2021 09:57:22 +1000
From: "Martin Thomson" <mt@lowentropy.net>
To: tls@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/6TQth68GYFmjA202vhrBWAQ-PyI>
Subject: Re: [TLS] 0-RTT in DTLS 1.3
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working
group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>,
<mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>,
<mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 May 2021 23:58:03 -0000
On Sun, May 23, 2021, at 16:05, Hanno Becker wrote: > 1) In DTLS 1.3, it would seem common for the server to send an HRR for > the sake of return routability checking. TLS 1.3 forbids the use of > 0-RTT after an HRR. So, 0-RTT can't be used in DTLS 1.3 if the server > requires return routability checking -- is this understanding correct? > Should this be stated more explicitly? This is not the model that QUIC uses. Binding return routability information into session tickets allows 0-RTT to be used, albeit at some risk. Managing that risk might take a few forms, the most common being limiting the total amount of response data and limiting the period over which 0-RTT is accepted (more than the 7 days). > 2) Not allowing 0-RTT after an HRR, or rather not allowing 0-RTT > *twice*, seems important for DTLS 1.3 as we'd otherwise overload epoch > 1. Is this worth stating? TLS already says that HRR automatically causes 0-RTT to be rejected. "Early data is not permitted after a HelloRetryRequest." (RFC 8446, Section 4.1.2)
- [TLS] 0-RTT in DTLS 1.3 Hanno Becker
- Re: [TLS] 0-RTT in DTLS 1.3 Martin Thomson
- Re: [TLS] 0-RTT in DTLS 1.3 Hanno Becker
- Re: [TLS] 0-RTT in DTLS 1.3 Martin Thomson
- Re: [TLS] 0-RTT in DTLS 1.3 Hanno Becker