You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 17, 2024. It is now read-only.
In miTLS, when resuming a session with a session ticket, the client simply call FFI_mitls_send, and the data may be sent over 0RTT. The server, calling FFI_mitls_receive will receive the data, without having any indication that the data is "early data" and is NOT replay protected. This can confuse developers and eventually cause software using miTLS to be vulnerable to replay attacks.
In comparison, OpenSSL have a complete separation of 0RTT data than the normal stream. They have
SSL_read_early_data
SSL_write_early_data
which allows the application to know which data is replay protected and which is not.
The text was updated successfully, but these errors were encountered:
In miTLS, when resuming a session with a session ticket, the client simply call FFI_mitls_send, and the data may be sent over 0RTT. The server, calling FFI_mitls_receive will receive the data, without having any indication that the data is "early data" and is NOT replay protected. This can confuse developers and eventually cause software using miTLS to be vulnerable to replay attacks.
In comparison, OpenSSL have a complete separation of 0RTT data than the normal stream. They have
which allows the application to know which data is replay protected and which is not.
The text was updated successfully, but these errors were encountered: