Re: [TLS] Final (hopefully) issues with DTLS 1.2

Joe Salowey <jsalowey@cisco.com> Tue, 14 June 2011 16:40 UTC

Return-Path: <jsalowey@cisco.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0120211E811E for <tls@ietfa.amsl.com>; Tue, 14 Jun 2011 09:40:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level:
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 509pR1Uommvz for <tls@ietfa.amsl.com>; Tue, 14 Jun 2011 09:40:52 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by ietfa.amsl.com (Postfix) with ESMTP id AAFAE11E80C9 for <tls@ietf.org>; Tue, 14 Jun 2011 09:40:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=jsalowey@cisco.com; l=4608; q=dns/txt; s=iport; t=1308069652; x=1309279252; h=subject:mime-version:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=T6+c8XK3SiPzQnY5Ut1igfLfwxeqoPZe6KEaOn/d5jA=; b=kDMpLPVyXnrkTi2q3KOJY0noMlRWMKkSdwme7AFrEvBbMbWMkqmhTMGg fmNbDqpXWyAUGu8mFk0JH81rhdCZ6/DNRyBf4t7dp+KWqfpyv32LXgABH goNSyys7Gx1SzP44qPXLN+Dy609+niirnVww9ugW7/sY9Xj9Y97CEMrwA c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EAM+O902rRDoI/2dsb2JhbABSplN3iHOiNZ5hhiQEhxWKM4RXizA
X-IronPort-AV: E=Sophos;i="4.65,365,1304294400"; d="scan'208";a="713322477"
Received: from mtv-core-3.cisco.com ([171.68.58.8]) by sj-iport-6.cisco.com with ESMTP; 14 Jun 2011 16:40:52 +0000
Received: from [10.33.249.205] ([10.33.249.205]) by mtv-core-3.cisco.com (8.14.3/8.14.3) with ESMTP id p5EGepqs004886; Tue, 14 Jun 2011 16:40:51 GMT
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Joe Salowey <jsalowey@cisco.com>
In-Reply-To: <4DF0CA9D.1030006@ieca.com>
Date: Tue, 14 Jun 2011 09:41:08 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <9ACC73EC-6834-465B-A5DD-A0DFAE80BD40@cisco.com>
References: <BANLkTikjMZpYm4Maef1wqnmH4RJ02-6t1g@mail.gmail.com> <4DF0CA9D.1030006@ieca.com>
To: Sean Turner <turners@ieca.com>
X-Mailer: Apple Mail (2.1084)
Cc: tls@ietf.org
Subject: Re: [TLS] Final (hopefully) issues with DTLS 1.2
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jun 2011 16:40:54 -0000

The open issue is with respect to the version number that Nikos raised.  Eric is working on text along the lines of Nikos' recommendation of fixing the version number.

Joe 
On Jun 9, 2011, at 6:29 AM, Sean Turner wrote:

> Does anybody else have thoughts about this?  I'd really like to be able to put this draft to bed.
> 
> spt
> 
> On 5/23/11 9:19 AM, Eric Rescorla wrote:
>> Following up on Prague, here is the new text for the 2MSL and the
>> record sequence number issues:
>> 
>> 
>> 
>> MSL:
>> 4.1.
>>    Note that because DTLS records may be reordered, a record from epoch
>>    1 may be received after epoch 2 has begun. In general,
>>    implementations SHOULD discard packets from earlier epochs, but if
>>    packet loss causes noticeable problems MAY choose to retain keying
>>    material from previous epochs for up to the default MSL specified for
>>    TCP [TCP] to allow for packet reordering. (Note: the intention here
>>    is that implementors use the current guidance from the IETF for MSL,
>>    not that they attempt to interrogate the MSL the system TCP stack is
>>    using.)  Until the handshake has completed, implementations MUST
>>    accept packets from the old epoch.
>> 
>>    ...
>> 
>> 4.2.4.
>>    In addition, for at least twice the default MSL defined for [TCP],
>>    when in the FINISHED state, the node which transmits the last flight
>>    (the server in an ordinary handshake or the client in a resumed
>>    handshake) MUST respond to a retransmit of the peer's last flight
>>    with a retransmit of the last flight. This avoids deadlock conditions
>> 
>> 
>> 
>> 
>> Record Sequence Number:
>>    When responding to a HelloVerifyRequest the client MUST use the same
>>    parameter values (version, random, session_id, cipher_suites,
>>    compression_method) as it did in the original ClientHello.  The
>>    server SHOULD use those values to generate its cookie and verify that
>>    they are correct upon cookie receipt.  The server MUST use the same
>>    version number in the HelloVerifyRequest that it would use when
>>    sending a ServerHello.  Upon receipt of the ServerHello, the client
>>    MUST verify that the server version values match. In order to avoid
>>    sequence number duplication in case of multiple HelloVerifyRequests,
>>    the server MUST use the record sequence number in the ClientHello as
>>    the record sequence number in the HelloVerifyRequest.
>> 
>> ...
>> 
>>    When the second ClientHello is received, the server can verify that
>>    the Cookie is valid and that the client can receive packets at the
>>    given IP address.  In order to avoid sequence number duplication in
>>    case of multiple cookie exchanges, the server SHOULD use the record
>>    sequence number in the ClientHello as the record sequence number in
>>    its initial ServerHello. Subsequent ServerHellos will only be sent
>>    after the server has created state and MUST increment normally.
>> 
>> I believe this matches what I said in Prague, but any objections to
>> this in concept or the way I've written it up.
>> 
>> 
>> Finally, I've been rethinking the issue of the interaction of the
>> ChangeCipherSpec and the handshake sequence numbers. In Prague I
>> suggested not changing this and just putting a note in the spec that
>> one had to be careful, but at this point I am thinking it might be
>> better to simple suck up the change and put a message sequence number
>> in the CCS. This removes the need to consult the handshake state
>> machine in order to deal with reordering, though not in order to
>> determine whether the CCS is at the appropriate place in the handshake
>> (in order to detect misbehaving or malicious behavior early).  The
>> downside for this is that it's a difference from TLS, but it seems
>> like fairly easy code--though I admit I haven't tried to code it up. I
>> don't think either way represents a security issue, but doing it this
>> way means that we won't need to be as careful in the future about
>> having the state machine be completely deterministic prior to the CCS,
>> which seems like the Right Thing. Comments?
>> 
>> -Ekr
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls