-
Notifications
You must be signed in to change notification settings - Fork 369
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DTLS anti replay mechanism #653
Comments
AFAIK, this is not deactivable with scandium. |
May be you can give us more information about your use-case? https://tools.ietf.org/html/rfc6347#section-3.3
So, do you want such a statistic? |
Hello, thank you for you answers. No I don't want any statistics. In my use case the data will be sent through different paths (packets 1,2,3,4 are sent on one path, packets 5,6,7,8 on another path,..) with different delays for each path. So depending on the size of the slidding window, if the lastest data sent arrive first, the oldest data sent may be discarded and I do not want that to happen. That's why I am asking if the anti replay mechanism can be deactivated. Have a good day |
And a "receive window" of 64 is not enough? |
Feel free to add a new comment to this issue or create a new issue, if this topic gets interesting again for you. |
OK, so disable would be enough? Should we go for
|
Hello @boaks , just to understand the window case:
Am I correct ? If it's the case it's OK on my side |
Message which are newer than the window, are always forwarded to the MAC check. |
Thanks for the clarification. It's OK for me |
I will prepare a PR (hopefully this week). |
Please check PR #906, if it works for you. |
I would appreciate, if you can give us your feedback about the PR. |
Hello, sorry for my late answer. I'll see if I can set up a test early next week to check if it works. Anyway if it's possible to deactivate the window or accept old messages, it will work for us. |
OK. If you can manage to test it, perfect. Otherwise we merge it and in the "worst case", fix it again after testing :-). |
It's merged. Don't hesitate to report, if it's not working for you as expected. |
Hello @boaks, I was not able to set up a test last week. When I'll be able to test it, I'll report issues if I find some. Thank you very much |
Hi @Philago, do you plan to use this "disabled filter" and DTLS 1.2 CID together? FMPOV, github.com/tlswg/dtls-conn-id, issues 69, would be an approach, which may work without a "filter window". Do you have collected any experience, if the ip-addresses of your delayed received messages are more up to date, then the newest ones according the epoch/sequence_number (consider to be not under attack)? If not, should we go for a configurable PR #1012 ? |
Not yet. When I am in the case where the messages are received out of order on the receiver side no source IP address is more up tot date than the other. I agree with you, updating the IP address only on newest record would work, even if the anti-replay window is deactivated. #1012 seems fine by me. I replied on the issue tlswg/dtls-conn-id#64 to be sure that we have the same understanding of the issues and the possible solutions. So for the anti-replay window, we will still have a 3 options no window, window and full ? With the window mode as follows: Thanks Philippe |
Yes, to keep the "window" options and to control the address updates, I think introducing the "newer" filter should work. |
Hi, are you still using Californium?
would that work for you? |
Hello,
Is it possible to deactivate the DTLS anti replay mechanism (slidding window) ?
RFC6347 §3.3 states that "DTLS optionally supports record replay detection"
Thanks !
Best regards
The text was updated successfully, but these errors were encountered: