Re: [TLS] Attack description ... was RE: DTLS 1.3 AEAD additional data

2020-04-24 Thread Achim Kraus
Hi Martin, > So this depends on either concurrent use of the two CIDs, with that and the "routing based on cid", I would raise the question, if the usage of the cid turns into a swiss-army-knife? Therefore it may get larger, and so it gets attractive, to use it only on the first record, but

Re: [TLS] Attack description ... was RE: DTLS 1.3 AEAD additional data

2020-04-24 Thread Martin Thomson
Hi Hannes, Let me see if I can clarify then :) On Fri, Apr 24, 2020, at 18:31, Hannes Tschofenig wrote: > > Say that a connection spans two network paths. CID A is used on path > A; CID B is used on path B. > I guess you are considering a scenario where a device, of the lifetime > of the

[TLS] Attack description ... was RE: DTLS 1.3 AEAD additional data

2020-04-24 Thread Hannes Tschofenig
Hi Martin, I have a few questions regarding the attack you mentioned below. I would like to understand whether it relates to the topic of how the additional data is constructed and what is included. > Say that a connection spans two network paths. CID A is used on path A; CID > B is used on