-
Notifications
You must be signed in to change notification settings - Fork 203
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for a hash-based Public Reset packet (#215) #20
Conversation
neither on-path nor off-path attackers should be able to forge one, but that on-path elements should be able to validate the public reset.
Hey EKR, Could you please open an issue to track discussion on this? Pull requests might not be seen by some people. Thanks. |
Hi Mark,
I already emailed the list. You want an issue as well?
…-Ekr
On Wed, Nov 23, 2016 at 3:04 PM, Mark Nottingham ***@***.***> wrote:
Hey EKR,
Could you please open an issue to track discussion on this? Pull requests
might not be seen by some people. Thanks.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#20 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABD1ofcEb3TINfUjWSXMXdjGMIEeyv3Tks5rBMZzgaJpZM4K7Gbu>
.
|
This is currently pretty badly bitrotten, we'll need to revisit this once we get some of the other work in place. This is blocked on transport parameters and header changes. |
This takes ekr's design from #20 and expands on it quite a bit. There are a few little wrinkles that I think we might want to discuss a little. First, this is a one-time password, so the combination of key and connection ID can't ever be repeated for a given server instance. Our 64-bit connection ID space isn't really enough to provide this. How a server moves to a new static key during operation will be challenging; it probably needs to partition the connection ID space. Second, transport parameters are encrypted. #20 made a point of having the verifier in the clear so that intermediaries could validate the Public Reset.
This takes ekr's design from #20 and expands on it quite a bit. There are a few little wrinkles that I think we might want to discuss a little. First, this is a one-time password, so the combination of key and connection ID can't ever be repeated for a given server instance. Our 64-bit connection ID space isn't really enough to provide this. How a server moves to a new static key during operation will be challenging; it probably needs to partition the connection ID space. Second, transport parameters are encrypted. #20 made a point of having the verifier in the clear so that intermediaries could validate the Public Reset.
This takes ekr's design from #20 and expands on it quite a bit. There are a few little wrinkles that I think we might want to discuss a little. First, this is a one-time password, so the combination of key and connection ID can't ever be repeated for a given server instance. Our 64-bit connection ID space isn't really enough to provide this. How a server moves to a new static key during operation will be challenging; it probably needs to partition the connection ID space. Second, transport parameters are encrypted. #20 made a point of having the verifier in the clear so that intermediaries could validate the Public Reset.
@martinthomson I don't care about the Github mechanics, but I think these are trying to address different design constraints, specifically, whether we want the public reset to be invisible to the middlebox. And if we do want that, then we should make it indistinguishable to the middlebox rather than labelled but unverifiable |
Possibly a more relevant question then: do you intend to update this to track the changes in the draft? I plan to update #460, which might mean making it publicly verifiable, or making the reset indistinguishable, or whatever the working group ends up with. |
I was hoping we would have a discussion of the design constraints in Paris and then we can design the crypto to suit. Would that work for you? |
Yep, that works perfectly. I was expecting that this would need to wait for Paris anyway. |
Closing in favour of #20 based on discussion in Paris. |
Add max crypto data extension text
The model here is that neither on-path nor off-path attackers should be able to forge one, but
that on-path elements should be able to validate the public reset.