Re: [rtcweb] Security architecture: Making ECDSA mandatory

"Alfred E. Heggestad" <aeh@db.org> Wed, 25 May 2016 10:17 UTC

Return-Path: <aeh@db.org>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7666E12D66A for <rtcweb@ietfa.amsl.com>; Wed, 25 May 2016 03:17:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c5NFhk_7S5bt for <rtcweb@ietfa.amsl.com>; Wed, 25 May 2016 03:17:07 -0700 (PDT)
Received: from out.tornado.email (out.tornado.email [195.159.144.141]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F3E312DA16 for <rtcweb@ietf.org>; Wed, 25 May 2016 03:17:06 -0700 (PDT)
Received: from [62.96.148.44] (helo=Alfreds-MacBook-Pro-2.local) by out.tornado.email with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.82) (envelope-from <aeh@db.org>) id 1b5VsP-0002VY-7B; Wed, 25 May 2016 12:17:21 +0200
To: Martin Thomson <martin.thomson@gmail.com>, "rtcweb@ietf.org" <rtcweb@ietf.org>
References: <CABkgnnWjaBqVdNurt+sd3w9U_rpTi0WJKFce12KfA2W1mrnsTA@mail.gmail.com>
From: "Alfred E. Heggestad" <aeh@db.org>
Message-ID: <57457B9F.7060709@db.org>
Date: Wed, 25 May 2016 12:17:03 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CABkgnnWjaBqVdNurt+sd3w9U_rpTi0WJKFce12KfA2W1mrnsTA@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtcweb/6RP_P67i1GpyyNM8zHiBchCdKRI>
Subject: Re: [rtcweb] Security architecture: Making ECDSA mandatory
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2016 10:17:09 -0000


On 13/06/15 00:06, Martin Thomson wrote:
> I've opened https://github.com/rtcweb-wg/security-arch/pull/33
>
> This changes the MTI cipher suites to ECDSA and does a little cleanup
> on the corresponding API requirements to more closely match what has
> just landed in the W3C specification.
>
> We discussed ECDSA and the only concerns raised were with
> compatibility.  I've done some testing with other implementations with
> no issues, and ECDSA seems to be well supported on all those
> hard-to-upgrade PSTN gateways (thanks to Cullen and Ethan for helping
> out with checks there and to NIST for creating certification pressure
> with FIPS-2).
>
> I have an implementation that switches Firefox to ECDSA with P-256 by
> default.  It's much, much faster.  http://bench.cr.yp.to/ claims that
> it's 150 times faster on mobile devices for keygen.
>

I can confirm this. Here at Wire.com we are using ECDSA certs for the
DTLS connections. Generating self-signed certs takes around 1 millisecond.



/alfred