Re: [hybi] A bit of pragmatism

Eric Rescorla <ekr@rtfm.com> Sun, 09 January 2011 22:14 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7A9EC3A6835 for <hybi@core3.amsl.com>; Sun, 9 Jan 2011 14:14:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.644
X-Spam-Level:
X-Spam-Status: No, score=-102.644 tagged_above=-999 required=5 tests=[AWL=0.333, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cy9LgZD1Iwh5 for <hybi@core3.amsl.com>; Sun, 9 Jan 2011 14:14:43 -0800 (PST)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by core3.amsl.com (Postfix) with ESMTP id 91F0F3A67D4 for <hybi@ietf.org>; Sun, 9 Jan 2011 14:14:43 -0800 (PST)
Received: by gyd12 with SMTP id 12so8049621gyd.31 for <hybi@ietf.org>; Sun, 09 Jan 2011 14:16:55 -0800 (PST)
MIME-Version: 1.0
Received: by 10.91.67.10 with SMTP id u10mr5414017agk.187.1294611413266; Sun, 09 Jan 2011 14:16:53 -0800 (PST)
Received: by 10.90.154.19 with HTTP; Sun, 9 Jan 2011 14:16:53 -0800 (PST)
In-Reply-To: <4D2A307C.3080109@callenish.com>
References: <20110106221426.GA28367@1wt.eu> <AANLkTimNc6YDUG=920P=G7kxs9oDwDEsGJ5LA6BG_iyb@mail.gmail.com> <20110107053410.GG28367@1wt.eu> <AANLkTinQADv+iq50=dsvK13cu1YdS5sb+xHvDZnfdOjB@mail.gmail.com> <20110107061043.GJ28367@1wt.eu> <AANLkTikHXQza-gx=tqD7jZ+ueQZTXa9acRVG+bBfdApG@mail.gmail.com> <20110107063854.GN28367@1wt.eu> <670C37A1-B413-49C0-8C47-E2E06DB447ED@apple.com> <20110107185801.GB32612@1wt.eu> <AANLkTinLf4z9S0EatVRi5ZdeEPcuJrOmvn6cpAELtf2w@mail.gmail.com> <20110107203958.GC32612@1wt.eu> <AANLkTinWX4k2mbGqK5qbiVtCTATC38xKJApLHCEuce85@mail.gmail.com> <4D28DF6E.4080003@callenish.com> <AANLkTikhgk7yRoC1K37QetW-7ZHw8G26WZVUs7fM2y=J@mail.gmail.com> <4D2A307C.3080109@callenish.com>
Date: Sun, 09 Jan 2011 14:16:53 -0800
Message-ID: <AANLkTimv-1DV=ZVyzSSaDHTsVGaRHm8kNPjWNVW5_a1G@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
To: Bruce Atherton <bruce@callenish.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: hybi@ietf.org
Subject: Re: [hybi] A bit of pragmatism
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Jan 2011 22:14:44 -0000

On Sun, Jan 9, 2011 at 2:02 PM, Bruce Atherton <bruce@callenish.com> wrote:
> Thanks for the correction, but I still don't understand.
>
> If you are suggesting your mask for the wss: scheme in order to provide for
> a stream of apparent random bits on the wire, then that makes perfect sense.
> But for the purposely less-secure unencrypted ws: scheme I don't understand
> why it would be necessary.

It's not a matter of random versus non-random. RC4 and AES-CTR without random IV
(which is not a requirement of the standard) provide the attacker with
complete control over
the payload bits on the wire, beause he can predict the keystream.

-Ekr


> On 08/01/2011 4:00 PM, Eric Rescorla wrote:
>>
>> On Sat, Jan 8, 2011 at 2:04 PM, Bruce Atherton<bruce@callenish.com>
>>  wrote:
>>>
>>> On 07/01/2011 1:19 PM, Eric Rescorla wrote:
>>>>
>>>> My objective is to make the bits that appear on the wire
>>>> indistinguishable
>>>> from random
>>>> from the attacker's perspective. I think it's clear that this is the
>>>> strongest form of masking
>>>> available, and the method I proposed does that.
>>>
>>> It is true that your goal is clear, but I don't understand why you think
>>> this goal is necessary.
>>>
>>> The specification already allows for two forms of Websocket, a simple one
>>> denoted by the scheme "ws:" and a secure one denoted with "wss:". The
>>> latter
>>> one will have the random byte stream characteristics you are interested
>>> in.
>>> If you are uncomfortable with any other kind of stream, make sure your
>>> client only supports secure Websockets.
>>
>> Regrettably, this is not the case except for certain specific ciphers
>> (in particular
>> block cipher in CBC mode.) It's not at all the case for RC4 and only
>> the case for
>> some CTR mode implementations.
>>
>> Best,
>> -Ekr
>
> _______________________________________________
> hybi mailing list
> hybi@ietf.org
> https://www.ietf.org/mailman/listinfo/hybi
>