Re: [TLS] Remove EncryptedExtensions from 0-RTT

Eric Rescorla <ekr@rtfm.com> Mon, 04 July 2016 13:30 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 317F112D131 for <tls@ietfa.amsl.com>; Mon, 4 Jul 2016 06:30:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QUp7NKotpbr8 for <tls@ietfa.amsl.com>; Mon, 4 Jul 2016 06:30:49 -0700 (PDT)
Received: from mail-yw0-x236.google.com (mail-yw0-x236.google.com [IPv6:2607:f8b0:4002:c05::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5444F12D11F for <tls@ietf.org>; Mon, 4 Jul 2016 06:30:49 -0700 (PDT)
Received: by mail-yw0-x236.google.com with SMTP id v77so39820434ywg.0 for <tls@ietf.org>; Mon, 04 Jul 2016 06:30:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=aPCwoVSRmluDXgYwiREqwBYavNbIcGUu6fg6GcSe+eU=; b=mNNeGlhFZ2D9AjB5sqti3gTJfOU0Zas/tJAlIsMfH4gX2YI83j6XnXJmQzum6fgmz4 OxuVttaLif1vFYnpiyS63U3UOAEbJi6KyzKTnMFOcOHtJ/xTZ1/iYYfGRGXTJan9UDw2 uDIzLOTbs4BGUknE4VA8l6ACE0wh8GpGNi+LtQz5ctDfscUCScb4yuF9a8zGEM+OSUWy 8jHybkqqILXT+Pu/5iWa2Ik8QTTFB7PSghZkGfId9CX18KNqNsMAR3fEXc9UjG/nNSGY Zzce5om58+A2/cOGRy49YdbAY9lOMC/ZAabdzO4RB0Gmso5dHitix4FrYRlOnacGXZOg EYjA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=aPCwoVSRmluDXgYwiREqwBYavNbIcGUu6fg6GcSe+eU=; b=Lulhr+9ICaTt5oKl+m8UjtmsNkiMxG2fZrOaiS/8fpshLbhRcDq7xeLYgKi6T1eQl7 VxetzbjKGnQuAWuKRLvMnIB6qgTxKOjsWaFFGa66mkXiPiPWaNfNkIPGKnrpw8b2gfE1 /Q1Ek217PFdPBKLA59VeOQTeCDr+6VJFnAIf9awcFAQRtdBKliMTnPFc8mIFUbuDMqbL cXSQ8XBRxHmootqzyEK3k/UNGo+fj4LIMHL7bcm/p4JA++A7J2UxHjmWZu2UlMwXEPSt Qz3rfrN3xVEkrKyqtpuZT20NM0AKwCNinRm3qN+3xYkSK5W+RbHC/dM4re5AA27/grBU Ws2Q==
X-Gm-Message-State: ALyK8tLoKm79E4hrpwanHyulWtAm0Z9c0Jt54rqHtIgV3zHKdKMepbkcjBK3nswdevfhDdVd9aN/dgB5OpOlnw==
X-Received: by 10.129.46.87 with SMTP id u84mr8078629ywu.214.1467639048646; Mon, 04 Jul 2016 06:30:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.132.211 with HTTP; Mon, 4 Jul 2016 06:30:09 -0700 (PDT)
In-Reply-To: <20160704125128.GA4287@LK-Perkele-V2.elisa-laajakaista.fi>
References: <CABkgnnVFg2iCc8eWX40+25ATE=dAw3WmndReO0ky2j1K_soLPQ@mail.gmail.com> <20160623103546.GA5287@LK-Perkele-V2.elisa-laajakaista.fi> <CAF8qwaB6EiP-O3s+pCw9wGHvAH1iFZRQ_GbNJOXwiO2LW4iCvg@mail.gmail.com> <CAF8qwaA-XVz-t8G5mos4mm9LfrVjEbh1TKy8n3uKi416t7e_MA@mail.gmail.com> <CABkgnnWEg31RrD+9-NJAg_R4oC9oPz4wWKFoxvhNJEi=9_o-Og@mail.gmail.com> <974CF78E8475CD4CA398B1FCA21C8E995655BEB2@PRN-MBX01-4.TheFacebook.com> <20160626163416.GA24381@LK-Perkele-V2.elisa-laajakaista.fi> <CABkgnnX-8p+-2jLs-ZSOA7p+4B23v3Sror5nztOsyHUtOsLs6Q@mail.gmail.com> <CABcZeBMCx21O3mk45u7SiXXutSohG15atuVrk-H9f+jE1LeDeg@mail.gmail.com> <20160704125128.GA4287@LK-Perkele-V2.elisa-laajakaista.fi>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 04 Jul 2016 06:30:09 -0700
Message-ID: <CABcZeBMKdbzSCFLbezNdN_BZ67cJCj05_KDiPkEDXcH9ic=g3w@mail.gmail.com>
To: Ilari Liusvaara <ilariliusvaara@welho.com>
Content-Type: multipart/alternative; boundary="001a114140ba2765080536cf5899"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/8e0U2H98mApMYyExChxxEFQrTRc>
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] Remove EncryptedExtensions from 0-RTT
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jul 2016 13:30:55 -0000

On Mon, Jul 4, 2016 at 5:51 AM, Ilari Liusvaara <ilariliusvaara@welho.com>
wrote:

> On Sun, Jul 03, 2016 at 06:00:25PM -0700, Eric Rescorla wrote:
> > I believe that this is the right design.
> >
> > The primary proposed use for EncryptedExtensions in the 0-RTT flight is
> for
> > EncryptedSNI. However, I don't believe that they are actually that
> useful in
> > this case because the design constraints for EncryptedSNI are intended to
> > allow the client to encrypt the SNI to a gateway but encrypt the traffic
> to
> > the hidden server, which means that you want the SNI to be protected with
> > gateway keys, not the terminal traffic keys.
> >
> > This design still allows two fairly elegant EncryptedSNI designs:
> >
> > - Stuff a self-encrypted value of the SNI into the ticket label (due to
> > Cedric Fournet).
>
> Just beware of replay on the server side (figured out recently why
> encrypted SNI is actually so nontrivial...)
>
> > - Establish a ticket to the gateway server and then encrypt the
> ClientHello
> >   that is destined for the hidden server in the 0-RTT early data flight
> to
> > the
> >   gateway, which deciphers it and passes it to the hidden server, which
> >   responds with the ServerHello (due to Martin Thomson)
> >
> > Both of these are more flexible than SNI in EE.
>
> This seems to assume that the final server supports TLS 1.3 + that TLS 1.3
> has hidden record types... At least if one wants to avoid double encrypt/
> decrypt.
>

Yes.


Extending to case where the final server is TLS 1.2 (or if TLS 1.3 removes
> hidden record types) and not doing full second encryption/decryption seems
> at least a bit harder..


Agreed. I am happy to punt the first case, and I don't sense enthusiasm for
removing the second case.

-Ekr


>
>
>
> -Ilari
>