Re: [TLS] I-D Action: draft-ietf-tls-pwd-04.txt

Watson Ladd <watsonbladd@gmail.com> Sat, 29 March 2014 01:40 UTC

Return-Path: <watsonbladd@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F4C21A025B for <tls@ietfa.amsl.com>; Fri, 28 Mar 2014 18:40:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 78tRJ-z5iwEv for <tls@ietfa.amsl.com>; Fri, 28 Mar 2014 18:40:45 -0700 (PDT)
Received: from mail-yk0-x233.google.com (mail-yk0-x233.google.com [IPv6:2607:f8b0:4002:c07::233]) by ietfa.amsl.com (Postfix) with ESMTP id CA59E1A0755 for <tls@ietf.org>; Fri, 28 Mar 2014 18:40:44 -0700 (PDT)
Received: by mail-yk0-f179.google.com with SMTP id 9so1432090ykp.10 for <tls@ietf.org>; Fri, 28 Mar 2014 18:40:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=SQUXWzszKN2rMpTyadeQxX6qTmX0Bo0Tla4HsxIscs0=; b=tsR9/qkT/laE6K6hk+joWo3B4aFWTaGS/tYhszbQ1ZQhuLWs4W1yu7zxgySzDpPKzc tX8QKsOpDxw9FotkI9RlR8HwpfvQEPNP12fuVL8aGcWRz5j/bjnrLK2Xg5OqfGGmG1TW bfRIvUTgRKQmH8HBUWzH0Zt9r4AG2ggNrT27d+JnJNeMYjzbEfL0vcPVHMiKH72cBj1m 7qpxBOT3cp3u2yF04tscnEJQVmUOgEO2QmkaJMURQBCfkWltZZVvM67wQqmKe+r9ITCb sMvZPB8BVMuSrjUsQvcDQbpcSAxtKn3+59Ci341ESinO/g6F5yMfLwZ+7MOATTcNTvtE ZydA==
MIME-Version: 1.0
X-Received: by 10.236.147.10 with SMTP id s10mr15938544yhj.88.1396057242466; Fri, 28 Mar 2014 18:40:42 -0700 (PDT)
Received: by 10.170.80.214 with HTTP; Fri, 28 Mar 2014 18:40:42 -0700 (PDT)
In-Reply-To: <f8dc8cec46f6126146a7afa2421e43de.squirrel@www.trepanning.net>
References: <20140328195334.19328.19928.idtracker@ietfa.amsl.com> <CACsn0c==pRzDKd7G=eAhds=o9qexqe9Jb3DgNC9gzh-6xaKcAQ@mail.gmail.com> <dd67ab76dee19a82a0dfcdaa6512b905.squirrel@www.trepanning.net> <CACsn0ckQiNODB9DLj5XpcQDH2ykfD76CoV11-R4JJL+1_Vogfw@mail.gmail.com> <f8dc8cec46f6126146a7afa2421e43de.squirrel@www.trepanning.net>
Date: Fri, 28 Mar 2014 21:40:42 -0400
Message-ID: <CACsn0cmRRygPPk8=iU536-TK9mDFVcMOrYw_1tNV3=LZ02_9Hw@mail.gmail.com>
From: Watson Ladd <watsonbladd@gmail.com>
To: Dan Harkins <dharkins@lounge.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/11vIKakckR4QfCtVp0dWbaJMk8o
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] I-D Action: draft-ietf-tls-pwd-04.txt
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Mar 2014 01:40:48 -0000

On Fri, Mar 28, 2014 at 8:07 PM, Dan Harkins <dharkins@lounge.org> wrote:
>
> On Fri, March 28, 2014 4:35 pm, Watson Ladd wrote:
>> On Fri, Mar 28, 2014 at 6:55 PM, Dan Harkins <dharkins@lounge.org> wrote:
>>>
>>> On Fri, March 28, 2014 2:49 pm, Watson Ladd wrote:
>>>> On Fri, Mar 28, 2014 at 3:53 PM,  <internet-drafts@ietf.org> wrote:
>>>>>
>>>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>>>> directories.
>>>>>  This draft is a work item of the Transport Layer Security Working
>>>>> Group
>>>>> of the IETF.
>>>>>
>>>>>         Title           : Secure Password Ciphersuites for Transport
>>>>> Layer Security (TLS)
>>>>>         Authors         : Dan Harkins
>>>>>                           Dave Halasz
>>>>>         Filename        : draft-ietf-tls-pwd-04.txt
>>>>>         Pages           : 35
>>>>>         Date            : 2014-03-28
>>>>
>>>> Why should we trust this PAKE? I've got only partial results in this
>>>> direction, but they are not sufficient for me to adopt it when better
>>>> validated alternatives exist like those based on distrustful MPC.
>>>
>>>   I'm not sure what you mean by "we" but it got quite a bit of review
>>> in CFRG and that resulted in fixing the only real technical issue
>>> brought
>>> up: potential for a side-channel attack. Scott Fluhrer came up with a
>>> way to do a random blinding of a value when checking whether its a
>>> quadratic residue that effectively addresses that concern.
>>
>> "We didn't break it in the four months we've looked at it" is not a
>> good enough reason.
>> Given that the experts you have consulted have expressed doubts about
>> ever determining its security, I'm inclined to be rather more
>> suspicious of it.
>
>   It's been more like 2 years, but nevertheless, your complaint is a
> lack of formal security proof. But that has never been a requirement
> for a draft in a WG in the Security Area, or any area for that matter,
> of the IETF.

So because I didn't complain when the Security Area was founded, I
don't get to complain now?
This takes estoppel to a bizarre extreme.

>
>> During the last half of those two months I was trying to show it would
>> work. The best I can do is reduce it to the two person case, but I
>> can't get it to anything computational.
>
>   What a drag, I was hoping you'd come up with something.
>
>>>   These ciphersuites are drop-in replacements for things like PSK
>>> ciphersuites, not for popular ones used in browsers. In fact, I agree
>>> with several on this list who are pointing out that using a PAKE in a
>>> browser is not a good idea.
>>
>> Why is a multi-party computation ala Socialist Millionaire's protocol
>> in OTR not feasible? That establishes a secure channel based on a
>> password shared on both ends in a way that is provably secure.
>> Aug-PAKE can easily be made to work symmetrically: why can't you use
>> that?
>
>   There is no draft specifying a multi-party computation ala the
> Socialist Millionaire's protocol in TLS, much less one that is as
> mature as TLS-pwd. Aug-PAKE doesn't work in TLS, as shown
> by draft-shin-tls-augpake-- what's conveyed in the ClientKeyExchange
> structure since the client's contribution has been overloaded into
> the ClientHello? Basically, the client must initiate in Aug-PAKE and
> that forces a square peg into a round hole, or introduces extra
> rounds.

Write one. It's your problem, not mine.

As for AugPAKE, that might be ugly, but it works. I'm not seeing a
barrier to implementation here. Furthermore, we could reverse the
roles of client and server if we wanted a symmetric version in which
the client talks first.

>
>   We have gone over this before, but it takes years to get a draft
> in the state necessary to become an RFC. You said it took more
> like 30 minutes, but I'm sure you'd like to reevaluate that after
> your experience with the CFRG I-D you have been writing. In
> any event, the only draft _right now_ that satisfies the requirements
> is TLS-pwd.

The concerns I have with Dragonfly cannot be fixed by fiddling with
verbiage. They are fundamental problems with the protocol presented
compared to the state of the art.

>
>> There are standard models for PAKE security. Does Dragonfly work in
>> them? It clearly requires the ROM: is that enough?
>>
>> You're asking this WG to approve adding a new cryptographic protocol
>> to TLS with dubious justifications, in fact nonexistent, of security,
>> when a well-studied body of knowledge on this problem exists. There is
>> a compelling case for a PAKE: there is not a compelling case for
>> Dragonfly.
>
>   The same WG that approved of RFC 4279, a Standards Track RFC that
> did not have a proof in the ROM because it has no security. Yes, that same
> WG. I'm proposing a set of robust and misuse-resistant replacements for
> the RFC 4279 ciphersuites.

PSK has no security? That's ridiculous: if high-entropy keys are used
it is fairly easy to see it is secure.

Dragonfly's "robustness" and "misuse-resistence" are nothing but
rhetoric, absent some reason to believe it actually has these
properties.

Sincerely,
Watson Ladd

>
>   regards,
>
>   Dan.
>
>> Sincerely,
>> Watson Ladd
>>>
>>>   If you're happy doing cert-based TLS, or happy with HTTP Digest
>>> authentication (or whatever) then these are not for you. But the
>>> entirety
>>> of networking  is not "the web" and these ciphersuites work well with
>>> some specific use cases (see the draft).
>>>
>>>   regards,
>>>
>>>   Dan.
>>>
>>>
>>
>>
>>
>> --
>> "Those who would give up Essential Liberty to purchase a little
>> Temporary Safety deserve neither  Liberty nor Safety."
>> -- Benjamin Franklin
>>
>



-- 
"Those who would give up Essential Liberty to purchase a little
Temporary Safety deserve neither  Liberty nor Safety."
-- Benjamin Franklin