Comments (5)
I plan to adress #183 and #184 in the same PR as they affect the same clauses.
from draft-westerlund-tsvwg-dtls-over-sctp-bis.
Regarding DTLS 1.2
RFC 6083
Before sending the Finished message, the active SCTP-AUTH key MUST be
switched to the new one.
Once the corresponding Finished message from the peer has been
received, the old SCTP-AUTH key SHOULD be removed.
In draft-ietf-tsvwg-dtls-over-sctp-bis-04 this has been changed to
After sending the DTLS Finished message for the
initial DTLS connection, the active SCTP-AUTH key MUST be switched
from key identifier 0 to key identifier 1. Once the initial Finished
message from the peer has been processed by DTLS, the SCTP-AUTH key
with Shared Key Identifier 0 MUST be removed.
After sending the DTLS Finished message, the new SCTP-AUTH key can be
used according to Section 4.7.
I don't understand why this was changed (though I might be responsible...). The abobe text in draft-ietf-tsvwg-dtls-over-sctp-bis-04 seems to contradict other text in draft-ietf-tsvwg-dtls-over-sctp-bis-04
The 64-byte shared secret MUST be provided to the SCTP stack as soon
as the computation is possible.
from draft-westerlund-tsvwg-dtls-over-sctp-bis.
Also, after the completion of the DTLS handshake, a new SCTP-AUTH key will be exported per {{handling-endpoint-secret}}.
This is also different from RFC 6083.
from draft-westerlund-tsvwg-dtls-over-sctp-bis.
We should clarify that no ULP data shall be sent until the peer has been authenticated by the endpoint, as well as having derived the key for SCTP-AUTH.
from draft-westerlund-tsvwg-dtls-over-sctp-bis.
I do think this issue is now handled with text changes in -05.
from draft-westerlund-tsvwg-dtls-over-sctp-bis.
Related Issues (20)
- Define how the SCTP-AUTH keys are derived HOT 5
- Don't reuse the RFC 6803 exporter label HOT 1
- EC(DHE) -> (EC)DHE HOT 1
- Resumption performance HOT 3
- Cryptographic considerations is very long HOT 1
- How do you limit new connections HOT 1
- Mandatory mutual authentication HOT 3
- Use RFC 7525(bis) HOT 3
- Authenticating fallback to RFC 6083 HOT 6
- DTLS 1.3 Only
- Editorial alignment in style of the IANA sub sections needed HOT 1
- DTLS considerations need to be clear that AEAD limits MUST be handled by new connection
- Address new vulnerabilities found in SCTP-AUTH HOT 10
- Clarify that COOKIE-ECHO and COOKIE-ACK are not authenticated
- Align terminology with RFC 9260 HOT 10
- Create DTLS/SCTP Control Message IANA registry
- Update solution properties description
- Add text on how SCTP restart works
- Overstated Security Properties
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from draft-westerlund-tsvwg-dtls-over-sctp-bis.