Fossati, Thomas (Nokia - GB/Cambridge)
2018-03-24 20:09:51 UTC
Hi folks,
For those who couldn't come to Wednesday's TLS session, the decision was
to progress CID for DTLS 1.2 separately from 1.3, in order to make it
available earlier.
The other decision was to not back-port the "CID update" signalling from
1.3 to 1.2, which means that if we want a coherent privacy story for
1.2, we need to do something outside DTLS.
<tldr>
Differently from DTLS 1.3, where two dedicated post-handshake messages
exist to run a "CID update" sub-protocol over an existing session, in
DTLS 1.2 endpoints are stuck with the connection ids that have been
negotiated at handshake time. The problem with this is that lacking
the ability to update connection ids mid-session limits the potential
to protect against an adversary that can observe multiple paths and
can correlate devices' interactions across those paths.
</tldr>
So, I was wondering whether we could add a couple of CoAP options with
same semantics as 1.3's RequestConnectionId and NewConnectionId and
piggyback those on confirmable transactions - yes, ACKing those signals
is not an option.
This is certainly not the cleanest design possible - it abuses a
construct that is intended for carrying representation semantics and
stuffs path attributes into it! - but I couldn't come up with anything
better, apparently.
Before starting to write up a proposal, I'd like to hear from the you
whether you think:
a) This approach unacceptable?
b) There's an alternative design?
Thanks for your time,
Cheers, t
For those who couldn't come to Wednesday's TLS session, the decision was
to progress CID for DTLS 1.2 separately from 1.3, in order to make it
available earlier.
The other decision was to not back-port the "CID update" signalling from
1.3 to 1.2, which means that if we want a coherent privacy story for
1.2, we need to do something outside DTLS.
<tldr>
Differently from DTLS 1.3, where two dedicated post-handshake messages
exist to run a "CID update" sub-protocol over an existing session, in
DTLS 1.2 endpoints are stuck with the connection ids that have been
negotiated at handshake time. The problem with this is that lacking
the ability to update connection ids mid-session limits the potential
to protect against an adversary that can observe multiple paths and
can correlate devices' interactions across those paths.
</tldr>
So, I was wondering whether we could add a couple of CoAP options with
same semantics as 1.3's RequestConnectionId and NewConnectionId and
piggyback those on confirmable transactions - yes, ACKing those signals
is not an option.
This is certainly not the cleanest design possible - it abuses a
construct that is intended for carrying representation semantics and
stuffs path attributes into it! - but I couldn't come up with anything
better, apparently.
Before starting to write up a proposal, I'd like to hear from the you
whether you think:
a) This approach unacceptable?
b) There's an alternative design?
Thanks for your time,
Cheers, t