[CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13
"Hao, Feng" <Feng.Hao@warwick.ac.uk> Thu, 23 May 2024 07:35 UTC
Return-Path: <Feng.Hao@warwick.ac.uk>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C06EDC18DBBB for <cfrg@ietfa.amsl.com>; Thu, 23 May 2024 00:35:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=warwick.ac.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wMKYVmjtRYIO for <cfrg@ietfa.amsl.com>; Thu, 23 May 2024 00:35:35 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-db3eur04on070c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0c::70c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCE49C18DBB6 for <cfrg@irtf.org>; Thu, 23 May 2024 00:35:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cnc/8vyv86OUSDzI72MkrlQlJ2iXq42g4KnQvS/FiKUky/yHBrLojICvUqvNsPfzzNSBEgd/jA/cICkAZJ9IKHm8GggYWFPKPqG6XwIWTIYOBmA/1GYnM4n324tUeuTX3t4B5cwDBiTyWvrxDCGtoAFr9rAs4XysWdReWk1HcANXH1hRNF3vjrAMy0UTv/t9Kf/3ba4W29dj38BVwZNM3fwbX5InaCQ8s/oJPujP4sWMrSZwfbc1NUIYcx9IyoYOrQ1SsCjJ9RmNwyqlLsNi1MqmebIpUcwyHDzvlCaNnT3/gKdjjxRTiBbp2P1FQfEB7nbQSaRG41gtChVIVJruPg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sLVjlamnQknnr6kSh+G3R7HwZr/vP6+eIN+16W/ap/Q=; b=Vcl+jjWHp3F9las/SK+MNtsFervWf8fT0lVAj1HjVh7j3FOFdYfGmanxKMtcgti7CgOej1ocjvbsxrinCafhwRRNXqMMyeg5rTqQTSQcuHn5Ap2GsiA16sjTQ84ILrE4T11lIEu01mMUMe5CqbeulhpZxSWcvB3iB+iI6xXJypZIv82UHc2KcA1RTjH7HM+TUuTflOBXp7O/nm15dEXrJKSBW0PYi9ezuDmO2F6cHsw4JY6Pzj1IkhFhusacdgSz/wMFccRQL5zCVaYl46m/3b56uU/a/JEe8BEgqCU/3XWhem2vZ3/wA23zoqNcJrQ1hGmeMAFPryz9UPKW5EF3MA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=warwick.ac.uk; dmarc=pass action=none header.from=warwick.ac.uk; dkim=pass header.d=warwick.ac.uk; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=warwick.ac.uk; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sLVjlamnQknnr6kSh+G3R7HwZr/vP6+eIN+16W/ap/Q=; b=uDcPmeI9eigww2HyUPoByHno9SUVI+RjItEMliKklx8eA1Sf0elACmmSBswVbmjfuw+PRQqrYI5IDSSYTSNcniT8YPE5yBMSmOTdL1oNIQvETGwUyyAPqEsor9f97nPRQT14aIi6ww+rI9YfGlwnPuR3SrNo3Wm4IoSy4P8VQok=
Received: from GV1PR01MB8436.eurprd01.prod.exchangelabs.com (2603:10a6:150:1f::14) by GV1PR01MB10751.eurprd01.prod.exchangelabs.com (2603:10a6:150:1ef::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7587.36; Thu, 23 May 2024 07:35:30 +0000
Received: from GV1PR01MB8436.eurprd01.prod.exchangelabs.com ([fe80::ad9e:98b7:f953:1388]) by GV1PR01MB8436.eurprd01.prod.exchangelabs.com ([fe80::ad9e:98b7:f953:1388%5]) with mapi id 15.20.7611.016; Thu, 23 May 2024 07:35:30 +0000
From: "Hao, Feng" <Feng.Hao@warwick.ac.uk>
To: Hugo Krawczyk <hugo@ee.technion.ac.il>
Thread-Topic: [CFRG] RGLC on draft-irtf-cfrg-opaque-13
Thread-Index: AQHaQ4bEYqdpvstXU0aPQXzd1fACt7D1Gw4AgBE+U4CAIq6PgIAfx66AgBt1TICACPGuAIADKpsAgACKH4CAB2b5AIAA3a0AgAW9QzWAAe02AIACWlnQgAscIYCAC+p2QIABTrcAgABrzGCABdmagIAAUwZQgABZ7gCAAAGTcIAAMWKAgAEBleCAAGqJgIAAR0kc
Date: Thu, 23 May 2024 07:35:30 +0000
Message-ID: <GV1PR01MB84361129416DC8B621CAAEDFD6F42@GV1PR01MB8436.eurprd01.prod.exchangelabs.com>
References: <CAMr0u6kOrbwdHEDmmGsVYzqjsEbzBCCtGL39jckNbSWsEumOQg@mail.gmail.com> <994001115.165708.1706765982169@email.ionos.com> <CACitvs8zzoQVY4uo1zOtoBWrSVOLfzGFBCsMnevxnCMXg-CJGw@mail.gmail.com> <CACitvs_kEOgBC0eZNbHZ1EBy6v7kqL2-99-A1kRD_QqTaTuQKw@mail.gmail.com> <CAMr0u6khy2oo6GpxYYWq803NPYvKHLk4=9Lf7Z5ddNVu8KbiZw@mail.gmail.com> <CACitvs-_iZ145ok1A8peN642Z2DmA=Pd1T2cJwrFnQo_PZxWqw@mail.gmail.com> <4277693.8349904.1713368966703@email.ionos.com> <CADi0yUPxQsktpso7htB5+6M+ZJRyhax+QiUBNJQa3RG5GwLfCw@mail.gmail.com> <1916772043.8833957.1713572703792@email.ionos.com> <CADi0yUPJP+PrLYxw1iCay3VFLYDqktja_51QLdW3YiKC9RW=Uw@mail.gmail.com> <CAMr0u6kypySZrDx5zMz9Y7S4U5-Z16vYSuwKvkOV89tgAh4C=w@mail.gmail.com> <GV1PR01MB8436DA9FC923665CE88FF637D61B2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUOoKRFxO85cYygX7V3jxL6kZE8hkW6S91eLa2fr_pgQ4g@mail.gmail.com> <GV1PR01MB8436A8B3E01489A85372BAAAD6192@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUP9RuR9c_jC-hDezOKz4TqqRurCPqFd18yBriZEVs1gEw@mail.gmail.com> <GV1PR01MB8436155CDCD501FD3D1C2137D6ED2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUMO+HMNNa5G4OX5O-3YRp77Y7Gdq2-ekQSuF4KnKia8=g@mail.gmail.com> <GV1PR01MB8436D21464504C1007B5C22BD6E92@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUNbiVTe9BaoCFgDaTC06Z1LMAx6q2hJDiWydpy6xFqtRQ@mail.gmail.com> <GV1PR01MB8436B6B6B75DEBC9F1FB30A9D6EA2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUNCkk8Y5dQJH6DjR33cP7KXXrQsmHfA0UDRxjGuoXCaLA@mail.gmail.com> <GV1PR01MB8436DBCC8F5B167B0B44490AD6EA2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUPcyc9oSM4NqWynkWuTPStnD9yqt4XwmAg7c=XjCtik4A@mail.gmail.com> <GV1PR01MB84364908B61E293E46012214D6EB2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUOtSBmCnQMP-MoyzzxF6LZQcrKfo03sN2cNuO6MS74NAg@mail.gmail.com>
In-Reply-To: <CADi0yUOtSBmCnQMP-MoyzzxF6LZQcrKfo03sN2cNuO6MS74NAg@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=warwick.ac.uk;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GV1PR01MB8436:EE_|GV1PR01MB10751:EE_
x-ms-office365-filtering-correlation-id: d594b4e4-20ad-444a-4d8c-08dc7afaec4e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|366007|1800799015|376005|38070700009;
x-microsoft-antispam-message-info: sd2g/OpZO+zftYMDf4kIkXOgK1PdTBqJ5MQcMDp3C72+nmHOvsqCiTzlo7Tzheal3StrgQC/3fdj4Z4C8NT2/ie9WvpK0aKYPuOtfLwhmt5dYSOExODE/80Tc/uuK2ITeP42aYYGnekUAfMMZulHhuqegSDDcuC6ioDQB5D47aFqoEYNL+X6zSkd1ptq7R3VxowUaGEqtmxukZFpvMx04wYcKv3fGYGswSYIExCCnS8n6mIXMKD/lXguItz0wBh9JpDZJSDFpgJhQVI7oB2o+o/RCXYFbIeXn/9asC+CVFp80JOcR3JxCzRAVUNHNtieq3KMD+eyhum8gZGfXjmE4M6vv3b3ieyJWZNhYNSHAE3fxoYdLo3qAeYgW4QDqz4ZQItj/4ML5GIAmIAd8E1u0Vz35NG6EQEGVSmwztvrCkxJGspYb8rUYB8wU9X6JKI1wNsfwTR5trBLxIE+BY5w+HsKqdIB/eo0m4YAauc3jpJFjocRI0Lf1aprGJK3JpB+UBI0kyPkYoLfMUxWb0kWDmVnkyBoH/M6+0DnrDYi5nDYsF1xO/RIkw0h+HRQyTmd3PUcWqYbwcNKV4naX5xcPJwBpbHtV5YmNDZ3UDKELftdnSJerfptKxH37BBn1qV8hixUAT7d6m+ZV5SdH3VrzcgCVC31q/wm7l/Mlz5MnBbkjvARbFSB28VSP44f3r6fRROGQl9J578lvji+yRmBJWb+D5ApNmnqNSgLGhce6nUW7i+32ic5CFMwSLYCyiRq4j1w0qQbEsx7CXpZ3nCWkzhH8hjUepmStW5u2/H/CDTs3z0+5xJEbQS3ROuyiVfEnrS191z9N5nUmpnGiRNuiSX/uTQp7MJpNU0LJQqmDj1rnz5WaVAru8ki21VOafpGu0n6+obAq9QKGs2FEH/xMhc7vWgnFpbQYVmfl/wLpRcX81rw50ttolnsEGGck1Yz51j/GaAi6+PTaj3h6lX4UGhcRVg/ZGugkQ/LGolD0uUAjFreU/4zOV2d7UOKLqpHm06+qKiHXcHoOq9GtAe0kInPiE/70ShRqJUQTHN1+Fwxp1E+rhuhsMhnGnAlOxYf8b9Ojk9+1bXcYd9eYzwPD9ILKa991JbMGv4YyY+86wTlD1Wh3jwcksF7uibOl65QhUvt21axpBmDAdrhLeTBp4GYltcPD1I0oxOVtPKgPDjp0ZHzy6C1M4+ldMPtvRndhAcf4TFm03w+NCxTRK5Uqb8vqSqEKG9zqk+MhuPG85Bgyqcl9r48SVOGqCeBDO32tbCPY9/0O3xEg6wPQfclWw==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR01MB8436.eurprd01.prod.exchangelabs.com;PTR:;CAT:NONE;SFS:(13230031)(366007)(1800799015)(376005)(38070700009);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GV1PR01MB84361129416DC8B621CAAEDFD6F42GV1PR01MB8436eurp_"
MIME-Version: 1.0
X-OriginatorOrg: warwick.ac.uk
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GV1PR01MB8436.eurprd01.prod.exchangelabs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d594b4e4-20ad-444a-4d8c-08dc7afaec4e
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 May 2024 07:35:30.4656 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 09bacfbd-47ef-4465-9265-3546f2eaf6bc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 4U3JFiZrTIFMShFnFyqosDY3vSOzVX4dzp2Bto513R+1rMmWmL5veDYcllmT9Z+DWl0leeYf3MUrZa1ONSY8N4ngQ/vei9fgvHeM1E2Ri6M=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR01MB10751
Message-ID-Hash: C7KKKHN4YB2SFIYJMO6ZXUJS2HM24TDP
X-Message-ID-Hash: C7KKKHN4YB2SFIYJMO6ZXUJS2HM24TDP
X-MailFrom: Feng.Hao@warwick.ac.uk
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: IRTF CFRG <cfrg@irtf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>
The counter-based threshold control at the server can get far more complicated than what you describe because of the “undetectable” nature of this online dictionary attack – the server can’t distinguish legitimate drop-outs (say due to network delay or error) and illegitimate ones (say an attack), and hence can’t reliably define what’s meant by an authentication failure. Legitimate users may be locked out of their accounts, not because of using the wrong password, but because of the data retransmissions in a slow network. I should highlight that SRP-6a is not subject to this attack, and is more secure in this regard. Cheers, Feng From: Hugo Krawczyk <hugo@ee.technion.ac.il> Date: Wednesday, 22 May 2024 at 15:07 To: Hao, Feng <Feng.Hao@warwick.ac.uk> Cc: IRTF CFRG <cfrg@irtf.org> Subject: Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 This does not require a 4th message. If the server counts the number of unsuccessful authentication attempts, it will increase the counter for the user upon receiving the first message and decrease it upon receiving a valid third message. On Wed, May 22, 2024 at 4:04 AM Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> wrote: This was explained in my first email on this thread and in the FC paper. Apologies if that was not clear. The key confirmation string in the 2nd message allows the client to check if the password guess is correct. If the malicious client drops out at this stage, the server can’t distinguish whether it’s a drop-out or an authentication failure, hence the online dictionary attack can be undetectable. To prevent this attack, we need to ensure the client is authenticated first. This requires a revision in the OPAQUE protocol: the server can’t send any key confirmation string in the 2nd message. The client sends a key confirmation string in the 3rd message. The server can only send its key confirmation string in the 4th message. Regards, Feng From: Hugo Krawczyk <hugo@ee.technion.ac.il<mailto:hugo@ee.technion.ac.il>> Sent: 21 May 2024 17:24 To: Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> Cc: IRTF CFRG <cfrg@irtf.org<mailto:cfrg@irtf.org>> Subject: Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Care to expand on undetectable online dictionary attacks? And how is any attack on the server resolved by the server sending one more message. On Tue, May 21, 2024 at 9:31 AM Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> wrote: That makes the server subject to an undetectable online dictionary attack. From: Hugo Krawczyk <hugo@ee.technion.ac.il<mailto:hugo@ee.technion.ac.il>> Sent: 21 May 2024 14:21 To: Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> Cc: IRTF CFRG <cfrg@irtf.org<mailto:cfrg@irtf.org>> Subject: Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Yes. On Tue, May 21, 2024, 04:01 Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> wrote: Does OPAQUE send any key confirmation string in the second message? From: Hugo Krawczyk <hugo@ee.technion.ac.il<mailto:hugo@ee.technion.ac.il>> Sent: 21 May 2024 04:02 To: Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> Cc: IRTF CFRG <cfrg@irtf.org<mailto:cfrg@irtf.org>> Subject: Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Sorry Feng. You are wrong about the need for a 4th message in OPAQUE. Full forward secrecy (against passive and active attackers) is provided by the 3-message protocol as documented in the paper's full version and in this draft. The undetectable online attack you refer to in your paper has nothing to do with forward secrecy or the need of a 4th message in OPAQUE. On Mon, May 20, 2024 at 4:16 AM Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> wrote: Hi Hugo, The cases of achieving forward security in TLS 1.3 and OPAQUE are different. Please allow me to elaborate. You introduced the weak/strong definitions of forward security in your 2005 HMQV paper. For a two-message AKE scheme with weak forward security, strong forward security can be obtained by sending a third message (to complete mutual authentication with explicit key confirmation). By “full forward security” in the updated OPAQUE paper on IACR e-print, I believe you refer to the strong notion since the paper mentions “against active attacks”. TLS 1.3 provides weak forward security in 1-RTT and requires 3 messages to achieve strong forward security. The OPAQUE paper follows the same. However, in TLS 1.3, the server holds a strong secret. But in augmented PAKE, the server holds a weak secret. This difference is crucial. As a result, the 3-message OPAQUE scheme with strong forward security is insecure as it’s vulnerable to an undetectable online dictionary attack. To prevent this attack, OPAQUE needs to be revised to require 3 messages to provide weak forward security, and 4 messages to achieve strong forward security. Therefore, the change from 2-message OPAQUE to 3-message OPAQUE has nothing to do with forward security (weak or strong). This revision in the protocol spec is necessary to prevent the undetectable online dictionary attack (which is a known attack in the PAKE literature but seems not covered in the original formal model and analysis in the 2018 OPAQUE paper). This attack doesn’t apply to TLS 1.3 because the TLS server holds a strong key (as opposed to a weak one). PS. We explained the undetectable online dictionary attack in our FC’24 paper (https://eprint.iacr.org/2023/768.pdf) To the best of my knowledge, this attack was not discussed during the PAKE review of OPAQUE. Regards, Feng From: Hugo Krawczyk <hugo@ee.technion.ac.il<mailto:hugo@ee.technion.ac.il>> Sent: 17 May 2024 04:16 To: Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> Cc: IRTF CFRG <cfrg@irtf.org<mailto:cfrg@irtf.org>> Subject: Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 The common definition of forward security, and the one followed in the internet draft (and paper), is that session keys remain secure (after being deleted) even upon the compromise of long-term key material in the future. In the case of aPAKEs, forward secrecy applies to the password, namely, a future leakage of the password does not compromise past session keys. This is achieved by OPAQUE in 3 messages (similar to the way that TLS 1.3 achieves forward security in 3 messages). Hugo On Thu, May 16, 2024 at 3:49 AM Hao, Feng <Feng.Hao@warwick.ac.uk<mailto:Feng.Hao@warwick.ac.uk>> wrote: Hi Hugo, > As for the 3-message issue, to address your concern, we intend to add the following sentence to the noticeable differences (with OPAQUE paper) section: > - The AKE describes a 3-message protocol where the third message includes client authentication material that the server is required to verify. This change (from the original 2-message protocol) was made to provide explicit client authentication and full forward security. The 3-message protocol is analyzed in the full version of [JKX18]. Sorry for my delayed response on this. If you want full forward security in the strong sense (with explicit mutual key confirmation), you will need 4 messages for OPAQUE, not 3. You can’t do explicit key confirmation in the 2nd pass. So the client sends its explicit key confirmation in the 3rd pass, and the server can only send its explicit key confirmation in the 4th pass. That takes 4 passes in total. As explained earlier, the reason that we may call OPAQUE a 3-pass scheme is entirely because 3 passes are the minimum required to finish client-to-server authentication for an augmented PAKE in a client-server setting and that the client needs to be authenticated first. At the end of the 3rd pass, the authentication from the server to the client is still implicit. I would suggest you remove the “and full forward security”. The claim of full forward security for the 3-message OPAQUE in the full version of the paper may need to be updated as well. Regards, Feng
- [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Stanislav V. Smyshlyaev
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Russ Housley
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Stanislav V. Smyshlyaev
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 steve
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Stanislav V. Smyshlyaev
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Stanislav V. Smyshlyaev
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Stefan Santesson
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Riad S. Wahby
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 stef
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Riad S. Wahby
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 stefan marsiske
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Riad S. Wahby
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Campagna, Matthew
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Stanislav V. Smyshlyaev
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 steve
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 steve
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- Re: [CFRG] RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Watson Ladd
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Eric Rescorla
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Eric Rescorla
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hugo Krawczyk
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Eric Rescorla
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Hao, Feng
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Watson Ladd
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Christopher Patton
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Christopher Patton
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Kevin Lewi
- [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13 Stanislav V. Smyshlyaev