[TLS] Re: Consensus call for RFC8773bis Formal Analysis Requirement
Eric Rescorla <ekr@rtfm.com> Sun, 29 September 2024 16:32 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8F9BC14F680 for <tls@ietfa.amsl.com>; Sun, 29 Sep 2024 09:32:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZAdf_lqYpjaN for <tls@ietfa.amsl.com>; Sun, 29 Sep 2024 09:32:46 -0700 (PDT)
Received: from mail-yb1-xb2a.google.com (mail-yb1-xb2a.google.com [IPv6:2607:f8b0:4864:20::b2a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9366AC14F61E for <tls@ietf.org>; Sun, 29 Sep 2024 09:32:46 -0700 (PDT)
Received: by mail-yb1-xb2a.google.com with SMTP id 3f1490d57ef6-e03caab48a2so2846040276.1 for <tls@ietf.org>; Sun, 29 Sep 2024 09:32:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20230601.gappssmtp.com; s=20230601; t=1727627566; x=1728232366; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=pMUwDPiyUY7WPVe//YtDkgi6kjCGOltl8LuwoWu9Ei8=; b=vfa3574tzpxybw/ZR19UELiMKMXxM29emZ7OIlXfRMzq5WxhriAY6I3sgBcI074QKi eLUh5OBDHiM8EPj0ypaVRXhAkYvMK5vPvUJhkOwJrg4IsjrkWozyApuXz0yf5iAtmTut 3PMGKY/1iPOhqWCrNMn5S14G6vFERmlLyOqNpap8UbQn2Avo/Xatcx1mNMrRmxA+wI/b YurCNVWj4ymGiNe///f5tIbQMehdiP1xFYXrLzxn53uCeBU7328qkQD42hfS1rDZKV6+ xgcG1SV3O52c8oF0cO0LntVl52Aj3Giy7Bal6lLZieF+uovmVMTsAvo+eF0Ob0l9FknZ CIew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1727627566; x=1728232366; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=pMUwDPiyUY7WPVe//YtDkgi6kjCGOltl8LuwoWu9Ei8=; b=smG9I/BU9MW2JK662z8f9PGu3K0Gk3mmjMHtv38Ct42syfoVzRCsDFvpF209Md2Qsj pVnP1xe2nYBfUaeVwyh8lMP28bsFJ8hMKhtItrK/6P/2Jplysq1lVTIJAKxUbMGBh+SX XKgpArrNvlEfMrw5kYiWzg+A5stBQ4ja+uSKJfiUyqbko8sIoxo3pxawe+2wd3kywko6 J3ffhYWQ5gi2Hx0LmH61jCpW/C3zqXUXtwGGeL9adLCEvW3QlMjoIxP/UOvIbHlNBYB9 U8KpTBr+2IR1KccbpsN0AiLOaRRyFotgsvAKCvu1R4S5JG6RvsOkagG9Y7WK05MsG8pY mGSQ==
X-Forwarded-Encrypted: i=1; AJvYcCVGKXmB6hKjG2lJzB8dgPVKJm76sPUS/TmpwphbCEoON4GwB+t4KfioyNCpjxL+F2hSvz0=@ietf.org
X-Gm-Message-State: AOJu0Yxc5iizh3OOCqEmQL1VZ5CG+30DBH479zIp2wycbm6Zsxl+J4vT 7RfqweMs3Rxlm8HIzJfgf1EtbLW94MhzDhnDhhPJ/42Kgl72jvFaHHv+bCDEZsdSzQ+l4zV8Utu vvp/DGYhE7KuzzWKaQd0UmLGa7JwzmW3J6S1WKWaIaOPL4mg2
X-Google-Smtp-Source: AGHT+IHMk//Ui2yG/NF99GfQBwayWsO8E2tvJM6WKuCEihJhuXTzrPWQdxP2PO0a9fPq728W/iURPjfZzIvZ9H44T1w=
X-Received: by 2002:a25:68cd:0:b0:e26:677:656d with SMTP id 3f1490d57ef6-e26067767aemr4706037276.10.1727627565616; Sun, 29 Sep 2024 09:32:45 -0700 (PDT)
MIME-Version: 1.0
References: <CAOgPGoBxoEhVkzb=WYFvNEhN0sKLDLir0qPVSqx_a=Co7dkXgA@mail.gmail.com> <CAOgPGoCLnLHbO9mTbaqjERbpFtoGyJeVk=mjDvxkJYe8nySTvw@mail.gmail.com> <0BAA3B8C-BAC0-47E1-A202-2BC4B001C48B@vigilsec.com>
In-Reply-To: <0BAA3B8C-BAC0-47E1-A202-2BC4B001C48B@vigilsec.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 29 Sep 2024 09:32:09 -0700
Message-ID: <CABcZeBNOv0Ghkjk37_3TX0WKVJz0MTPQOPcgud1j8EZm_e3ATg@mail.gmail.com>
To: Russ Housley <housley@vigilsec.com>
Content-Type: multipart/alternative; boundary="0000000000005a6f45062344a39a"
Message-ID-Hash: OJTX7WU5T4S2DYJDF4OJMBVTSZZ3JEQW
X-Message-ID-Hash: OJTX7WU5T4S2DYJDF4OJMBVTSZZ3JEQW
X-MailFrom: ekr@rtfm.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: IETF TLS <tls@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS] Re: Consensus call for RFC8773bis Formal Analysis Requirement
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/CWoQa_4XN7lbiabFcruUWVaOoLQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Yes, but the question is whether the protocol actually *provides* the property that authentication is based on certificates. The point of the analysis is to determine that. -Ekr On Mon, Sep 23, 2024 at 3:55 PM Russ Housley <housley@vigilsec.com> wrote: > I agree, and I think the Security Considerations already cover this point: > > If the external PSK is known to any party other than the client and > the server, then the external PSK MUST NOT be the sole basis for > authentication. The reasoning is explained in Section 4.2 of > [K2016]. When this extension is used, authentication is based on > certificates, not the external PSK. > > Russ > > On Sep 23, 2024, at 4:49 PM, Joseph Salowey <joe@salowey.net> wrote: > > There is rough consensus that the document should have additional formal > analysis before publication. Ekr proposed the following for the > authentication property, which seems like a reasonable clarification > > "I think the right analysis is one in which the attacker knows the PSK. > For instance, say we have a company where everyone shares a PSK (as some > kind of post-quantum protection) and you want to make sure employee A > cannot impersonate employee B." > > At this point it is up to the authors and working group to address the > request for additional symbolic analysis in order to move the document > forward. > > The consensus call also indicated that there is a need to continue to work > out the process for formal analysis triage which we are working on as a > separate topic. See interim scheduling poll from Sean. > > On Fri, Aug 23, 2024 at 10:30 AM Joseph Salowey <joe@salowey.net> wrote: > >> In regard to moving RFC 8773 to standards track the formal analysis >> triage group has provided input on the need for formal analysis which was >> posted to the list [1]. The authors have published a revision of the draft >> [2] to address some of this feedback, however the general sentiment of the >> triage panel was that there should be some additional symbolic analysis >> done to verify the security properties of the draft and to verify there is >> no negative impact on TLS 1.3 security properties. >> >> The formal analysis is to verify the following properties of the proposal >> in the draft: >> >> - The properties of the handshake defined in Appendix E.1 of RFC8446 [3] >> remain intact if either the external PSK is not compromised or (EC)DH is >> unbroken. >> - The public key certificate authentication works as in TLS 1.3, and this >> extension adds the condition that the party has possession of the external >> PSK. The details of external PSK distribution are outside the scope of this >> extension. >> >> This is a consensus call for the working group to determine how to >> proceed between these two options: >> >> 1. Require formal analysis in the symbolic model to verify that the >> proposal in the document does not negatively impact the security properties >> of base TLS 1.3 and that the additional security properties cited above are >> met >> 2. Proceed with publishing the document without additional formal >> verification >> >> Please respond to the list with a brief reason why you think the document >> requires formal analysis or not. This call will end on September 16, 2024. >> >> Thanks >> >> Joe, Deirdre, and Sean >> >> [1] >> https://mailarchive.ietf.org/arch/msg/tls/vK2N0vr83W6YlBQMIaVr9TeHzu4/ >> [2] >> https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-8773bis-00&url2=draft-ietf-tls-8773bis-02&difftype=--html >> [3] https://www.rfc-editor.org/rfc/rfc8446.html#appendix-E.1 >> > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org > > > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org >
- [TLS]Consensus call for RFC8773bis Formal Analysi… Joseph Salowey
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Ben Smyth
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Eric Rescorla
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Bob Beck
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Deirdre Connolly
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Deirdre Connolly
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Deirdre Connolly
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Muhammad Usama Sardar
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Stephen Farrell
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Christopher Patton
- [TLS] FATT Process Joseph Salowey
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Eric Rescorla
- [TLS] Re: FATT Process Stephen Farrell
- [TLS] Re: FATT Process Joseph Salowey
- [TLS] Re: FATT Process Salz, Rich
- [TLS] Re: FATT Process Stephen Farrell
- [TLS] Re: FATT Process Watson Ladd
- [TLS] Re: FATT Process Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS] Re: Consensus call for RFC8773bis Formal An… Joseph Salowey
- [TLS] Re: Consensus call for RFC8773bis Formal An… Russ Housley
- [TLS] Re: Consensus call for RFC8773bis Formal An… Eric Rescorla
- [TLS] Re: Consensus call for RFC8773bis Formal An… John Mattsson
- [TLS] Re: Consensus call for RFC8773bis Formal An… John Mattsson
- [TLS] Re: [TLS]Consensus call for RFC8773bis Form… Muhammad Usama Sardar