Re: [TLS] Ala Carte Cipher suites - was: DSA should die

Aaron Zauner <> Sat, 04 April 2015 04:52 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id AF8321A89EF for <>; Fri, 3 Apr 2015 21:52:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_52=0.6, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id PkGB9s0guaRj for <>; Fri, 3 Apr 2015 21:52:57 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 53E991A01EC for <>; Fri, 3 Apr 2015 21:52:57 -0700 (PDT)
Received: by wixm2 with SMTP id m2so82556229wix.0 for <>; Fri, 03 Apr 2015 21:52:56 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20130820; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :cc:subject:references:in-reply-to:content-type; bh=nqMIG6IOET3Ac6ufjxzBuHV0GkN1NhN//2GNJ6Mtnbc=; b=jHj8eo+Yp3oZxrqi3EWeHWGNfIko9RuN3j76l3xooJiw+sJW5wDYxidZrWXRErekbD AJFKxlCZ/KkndWc6vVGI0yQ9ocHvim3/gYTZkHibPs6O0OjOqhcUkDeOj5XZuwSHA5U4 p8XqXrvYd5zK8yT875UYAEnTW/rfNR5vzmnj1uTJqIZ9cA27T7xOtFMf7WlSgHJUTp4k TkXk0DiajXi2BaNO64LiZyeObmphIj8F/kwBmq0AGSOfw41kH2OyKU0iF2a5mAhBHl58 Gfk+ALF/nfymCoL1md7ZSXiKB0xsTgfowGkoO9phd3NcdBy4CfnKOXO/h5/k5W4Hdmw/ POoA==
X-Gm-Message-State: ALoCoQl615AXzGq6HpzhzHyqj8RrNknPiwamrK0AolyiQS/rkiDhKqZXsbTu/xWppXLSPyaFo1c4
X-Received: by with SMTP id kb4mr10764215wjc.32.1428123176025; Fri, 03 Apr 2015 21:52:56 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id xy2sm14100793wjc.14.2015. (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 03 Apr 2015 21:52:54 -0700 (PDT)
Message-ID: <>
Date: Sat, 04 Apr 2015 06:52:50 +0200
From: Aaron Zauner <>
User-Agent: Postbox 3.0.11 (Macintosh/20140602)
MIME-Version: 1.0
To: Dave Garrett <>
References: <> <> <> <>
In-Reply-To: <>
X-Enigmail-Version: 1.2.3
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig6BCE258E0BB68E0F05356AB0"
Archived-At: <>
Subject: Re: [TLS] Ala Carte Cipher suites - was: DSA should die
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sat, 04 Apr 2015 04:52:58 -0000


Dave Garrett wrote:
> (by the way, do we really want plain PSK?)

Added the PSK ciphersuites after lengthy discussion with nikos and peter
gutmann, they assure me it's of importance to the embedded world.

> Just splitting it into only two parts would avoid the risk of support holes you'd get with the full a la carte route.
> There's plenty of space in the registry to keep adding piles and piles of variations for each suite, but I have seen actual instances where a server and client actually do support the same handshake and connection ciphers in TLS 1.2, but don't negotiate it because the specific combination isn't listed. The current system does lead to some support holes as-is.

I actually really like the idea. But there're a couple of open questions
to that; What happens to existing ciphersuites? And given we switch to a
model of asymmetric and symmetric ciphersuites: (how) do we document all
the implicit ciphersuites that are defined once a new symmetric or
asymmetric algorithm is defined?