Re: [TLS] Negotiate only symmetric cipher via cipher suites (was: Ala Carte Cipher suites - was: DSA should die)

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Mon, 13 April 2015 17:31 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DB581AD05F for <tls@ietfa.amsl.com>; Mon, 13 Apr 2015 10:31:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WvaCJPu6svIQ for <tls@ietfa.amsl.com>; Mon, 13 Apr 2015 10:31:26 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [209.234.253.108]) by ietfa.amsl.com (Postfix) with ESMTP id 8042C1AD05E for <tls@ietf.org>; Mon, 13 Apr 2015 10:31:26 -0700 (PDT)
Received: from fifthhorseman.net (unknown [38.109.115.130]) by che.mayfirst.org (Postfix) with ESMTPSA id 1C16BF984; Mon, 13 Apr 2015 13:31:23 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 072A3200F2; Mon, 13 Apr 2015 12:31:13 -0500 (CDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Dave Garrett <davemgarrett@gmail.com>, tls@ietf.org
In-Reply-To: <201504131325.20590.davemgarrett@gmail.com>
References: <CAK9dnSyKf7AY11h1i1h+SudRc-NmTZE5wC682YKhNsxnfV5ShQ@mail.gmail.com> <201504131200.00384.davemgarrett@gmail.com> <874mokug5y.fsf@alice.fifthhorseman.net> <201504131325.20590.davemgarrett@gmail.com>
User-Agent: Notmuch/0.18.2 (http://notmuchmail.org) Emacs/24.4.1 (x86_64-pc-linux-gnu)
Date: Mon, 13 Apr 2015 13:31:12 -0400
Message-ID: <871tjoue8v.fsf@alice.fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/4151_3S-wXDFMjGQG2lgNBuU9BY>
Subject: Re: [TLS] Negotiate only symmetric cipher via cipher suites (was: Ala Carte Cipher suites - was: DSA should die)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2015 17:31:27 -0000

On Mon 2015-04-13 13:25:20 -0400, Dave Garrett wrote:

>> So if we have to have non-(EC)DHE PSK, what would it mean if a TLS peer
>> were to try to negotiate:
>> 
>>   key agreement: PSK
>>  authentication: RSA-PSS
>> 
>> Do we just say "don't do that"?
>
> SGTM

This, i think, is one of the serious concerns about splitting the
ciphersuite into orthogonal vectors.

Once the full cartesian explosion is available by multidimensional
enumeration, we have to mark out which corners of the space are actually
bad ideas, and we have to make sure our implementations don't stumble
into those corners by accident.

This isn't impossible to do, but it seems ripe for subtle implementation
bugs.

     --dkg