The work in DNSOP on the SVCB record raised a few awkward questions about the 
potential for downgrade attacks.  Where protocols aren't compatible -- that is, 
A is not compatible with B if you can't attempt A and negotiate B -- you don't 
get downgrade protection.  ALPN only really protects against downgrades with 
compatible protocols.

With QUIC, and increasing diversity of protocol usage across TLS and DTLS, 
there are more opportunities for incompatible protocols to be used.

I've done a quick writeup of something that might work:

https://datatracker.ietf.org/doc/draft-thomson-tls-snip/
https://martinthomson.github.io/snip/draft-thomson-tls-snip.html

Thoughts would be appreciated.

As a footnote: this makes some assumptions about the way that ALPN is used.  
That is, this relies on the same ALPN not being used in incompatible protocols. 
 The ALPN registry already lists one counterexample in stun.turn [RFC7443] 
which can be used over both DTLS and TLS.  I personally think that was a 
mistake, but I know that others disagree.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to