On 30 March 2016 at 11:30, Colm MacCárthaigh <c...@allcosts.net> wrote:
> * How is the elapsed time on the wire authenticated? can't an attacker
> modify it and replay?

It is authenticated by virtue of being part of the session transcript.
It will be authenticated by the Finished message included by the
client, by the key derivation, and ultimately by the remainder of the
1RTT handshake.

> * Should the difference really be 1RTT, or 1/2 RTT (well, really "TT" I
> guess) ?

No.  The server records the time that it generates the ticket.  Then
that ticket travels to the client (1/2 RTT).  At that point the
counter starts.  Then, on resumption, the client stops the clock and
sends the message to the server (1/2 RTT).

> * Clock drift; especially on clients, seems like a real problem here - how
> tight would realistic tolerances be?

Clock drift over this time frame is a small problem, but one that can
be managed by having a small allowance for drift.  In my experience,
drift is likely to be small enough that errors in RTT measurement are
more likely to dominate [47][48].  What is more likely to be a problem
is time corrections during that time (via NTP for instance).

In any case, these sorts of errors fail soft.  You just lose 0-RTT.

[47] I have seen drift in the order of seconds per day, but that is
rare.  Those users will find lower rates of 0-RTT acceptance, or 0-RTT
will only work over shorter periods.  That's not great, but we can't
always win.  Most clock errors are simple "I didn't even setup NTP"
sort of problems.

[48] Users with high round trip variability will suffer too.  That's
very common in developing countries, and on wireless networks.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to