[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [radext] RDTLS #65 (new): Multiple dtls sessions in a tuple?



On Mon, 21 Feb 2011, Alan DeKok wrote:

Peter Deacon wrote:
Isn't this what client hello /w cookies and the secure handshakes are
for? Surely these can't be spoofed so easily?!

 This is assuming you get that far.  My assumption is that maintaining
multiple DTLS sessions for the same {src ip/port dst ip/port}
combination is a bad idea.  I do not know the security implications of
doing it, and I don't think I'm enough of a TLS expert to say.

There are no implications. DTLS does not know or care about the underlying transport. It does not know what "UDP" is. If the transport can't handle app data it does not know about then there are much bigger problems because its trivial for anyone to spoof such packets.

Given a choice I prefer whatever gets characterized as impractical, ugly, unacceptable hacks if they translate into operational reduction in unreliable behavior and happy customers.

I agree with you it is better not to go there if not absolutely necessary and in this case it may not be but old ports are now potholes... and this scares me.

These things should be in the RDTLS draft. It would stink if someone used a "connected" socket and (IMHO naturally) tried to reconnect the TLS channel using the same socket(src port).. and when doing this some servers sometimes did not accept the new connection for some period of time because of this behavior.

regards,
Peter

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>