Hi Ben,

Thanks for your input.

As I am currently dealing with a DoS from the IESG, I'm going to just file 
issues for these and promise to get back to you.  (You are flagged on them, and 
I've included some off-the-cuff responses there in case you want to add more.)

On Thu, Jan 7, 2021, at 04:02, Ben Schwartz wrote:
> Hi Martin,
> 
> Thanks for the update.  I agree this is clearer.
> 
> I'm having trouble understanding the "default authentication scope".  
> How can this be a useful construct, if clients and servers are both 
> forbidden from using it?
> 
> Section 7 says that ordinary connection to a service by its AAAA record 
> and a well-known port "does not provide enough information to locate 
> other incompatible protocols".  That seems like a convention, rather 
> than a matter of fact.
> 
> Overall, I still think SNIP would be more useful if it focused on the 
> scope of "same IP and port number", which would minimize coordination 
> problems and increase utility in most use cases.  That happens to be 
> the effect of the "QUIC" scope anyway.  I would call this the "default" 
> scope.
> 
> BTW, Section 6.2 seems to assume that all ServiceMode (formerly 
> "ServiceForm") SVCB records in an RRSet have the same TargetName 
> (formerly "SvcDomainName"), but that is not required.  The scope as 
> currently defined is effectively "same IP", which is narrower.
> 
> On further consideration, I think a SVCB scope may be unworkable.  
> Consider a CDN customer who copies the CDN's ServiceForm RRSet into 
> their own domain, and (alas) fails to keep it up to date.  If the CDN 
> adds a new incompatible protocol, everything will work fine, but SNIP 
> will flag this as an attack, possibly making the customer's site 
> unreachable.
> 
> The problem is that the SVCB scope doesn't identify _which_ SVCB RRSet 
> it's referring to, and it's not always easy to enumerate all the SVCB 
> RRSets that include a particular endpoint.
> 
> On Mon, Jan 4, 2021 at 1:45 AM Martin Thomson <m...@lowentropy.net> wrote:
> > Hi all,
> > 
> > I've refreshed this draft:
> > 
> > https://datatracker.ietf.org/doc/draft-thomson-tls-snip/
> > 
> > Synopsis: This describes a method for protecting against downgrade attack 
> > when protocols are in some way incompatible such that ALPN cannot provide 
> > that protection.
> > 
> > This revision is an attempt to more fully and clearly describe how this 
> > works.  I'm still not entirely happy with how this explains itself, but it 
> > should be marginally clearer now.
> > 
> > Cheers,
> > Martin
> > 
> > _______________________________________________
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls
> Attachments:
> * smime.p7s

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to