Re: [TLS] Choice of Additional Data Computation

Eric Rescorla <ekr@rtfm.com> Fri, 24 April 2020 18:56 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2103D3A0799 for <tls@ietfa.amsl.com>; Fri, 24 Apr 2020 11:56:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8phM3qY3M3on for <tls@ietfa.amsl.com>; Fri, 24 Apr 2020 11:56:49 -0700 (PDT)
Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5461C3A0798 for <tls@ietf.org>; Fri, 24 Apr 2020 11:56:49 -0700 (PDT)
Received: by mail-lf1-x129.google.com with SMTP id l11so8573207lfc.5 for <tls@ietf.org>; Fri, 24 Apr 2020 11:56:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=0WwsXrm2G8hfplJrRvZbK2X2FThyTtvKVQ2tsfnhFzM=; b=UHROI4s5JEPsJiwzGr23nBlK1fj7Rv+9/Aa7DsQvwuBTxZLhOTuVC3AI1lhPQX2Ix7 9g1o4VMba+QGCoiTxO6L6bOKP9lcBlErdz80rL3M2NT4y3ZhnDzTPCVduCmcTlD6vWIK 37AilCL/xBby9NZCgL85iXXumI1VYywxlTB41KIgt9oBHIksxZDfr20fqU5ekar91/f8 62jV/hxUk3XsDQ7BzDPWjLRDBAtlc9+I5nZjx+qZHZD2/XKh1bhHqFZp6c7njyIBqE6G efIbTBRynu6YfROkxZOk5Bf3EdXX2Bv0tnPdDHo9yLleKR+mBNNjrznDAqbDgk74Souk 3cGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0WwsXrm2G8hfplJrRvZbK2X2FThyTtvKVQ2tsfnhFzM=; b=uVGEPqXaKQpjJoW9KAt9Tc8zV/IrDLNmDQr9KXS4TACkkPJfS7CwkAehIGs1YfWqWF BHGqTxFqUm2ZRWjaqyoOQJNQfDYG9qx6UJXePYkMFXghToS2JgvzUWJd7xp8aLePn9ck RMg80Oh/e81hNhd4+epzwX0NcwKe7M4LIBesSu1/nIbkq++fZcbbTDiQDEPnn09retFF HcA5zYGFXdXA4+5ykwBKV8b2Zmc8STI2ALet6J/p9NJh5dWy591q3TyDzpbP4Uiw8k0B xNfxzE1t2ckkzHCiog7UljerbD+zZ0Neg1I2vFHLhmQpyC08sKzg6+obScdrAjWQurMb H6yA==
X-Gm-Message-State: AGi0Pubv6Q64kmfF53acRa6No6wC8GMOmQkta1PbzTfu+iZkDqQQBmGq QYhKX56VYkfyNboqjAQ1BlEiZgCnPUIkKdJ3GewObrvlQL4=
X-Google-Smtp-Source: APiQypLE9dh0lOaclrLsIpee6+/yqMO8n2+qe1TYSq9D6zq7jtI+WAS2EjNGeLUxUx+OTvE3JaY2xAqZiGzVxUdh3pE=
X-Received: by 2002:a19:9141:: with SMTP id y1mr7079818lfj.168.1587754607444; Fri, 24 Apr 2020 11:56:47 -0700 (PDT)
MIME-Version: 1.0
References: <AM0PR08MB371694E826FA10D25F2BA53EFAD00@AM0PR08MB3716.eurprd08.prod.outlook.com> <93042b37-37e1-5b6a-3578-a750054d0507@gmx.net> <AM0PR08MB3716541F4825F8D43DC3D308FAD00@AM0PR08MB3716.eurprd08.prod.outlook.com> <CACLV2m4-Qcx-xKWP201VCY73HVyjCzHVCb6PrntnBWhA8fBQYg@mail.gmail.com> <AM6PR08MB3318B6ABD411C8C476C3D10B9BD00@AM6PR08MB3318.eurprd08.prod.outlook.com> <CABcZeBOwK7m465LsbY3U+bHv0XA2rcGOTEBStTtTNkwAYvWeQA@mail.gmail.com> <CACLV2m5Md2+Ffc978ZJ+BeZwRgcXTV3xE0vXzmvNgnot_c71xQ@mail.gmail.com> <AM6PR08MB331862B6F143652F4B4C10EE9BD00@AM6PR08MB3318.eurprd08.prod.outlook.com> <CABcZeBMKoVrcN-=aTvy6py5bhOwOVrhgVLmtX2tthc=Oa54b_Q@mail.gmail.com> <CACLV2m7knyt-gQoQq2v1Kz-J62DPjCpb6faJFfDgJ-8mprHwxQ@mail.gmail.com>
In-Reply-To: <CACLV2m7knyt-gQoQq2v1Kz-J62DPjCpb6faJFfDgJ-8mprHwxQ@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 24 Apr 2020 11:56:11 -0700
Message-ID: <CABcZeBMwQHdRuvcs5pmE59SCUj=cwWCtrBhyh9w_L0U1ZDoJ8Q@mail.gmail.com>
To: chris - <chrispatton@gmail.com>
Cc: Hanno Becker <Hanno.Becker@arm.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, "tls@ietf.org" <tls@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005e1bb805a40dedcc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/F83v6egKjVlt2I2sZu8JkpwojBc>
Subject: Re: [TLS] Choice of Additional Data Computation
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Apr 2020 18:56:51 -0000

On Fri, Apr 24, 2020 at 11:51 AM chris - <chrispatton@gmail.com> wrote:

>
> I don't think that's at all obvious. Again, the problem with the
>> pseudo-header is you are authenticating some abstract information, *not*
>> what is actually on the wire, and that allows the attacker to manipulate
>> what's on the wire undetected. We have no analysis for the impact of that.
>>
>
> Yes, this is the way I see it. I think you can get by with implicitly
> authenticating things, but when you start doing this, the details of how to
> decode the data on the wire begin to really matter for the proof (and
> potentially for an attacker). This can get complicated if, as you say, the
> header's content is highly variable. So, I would recommend authenticating
> what's on the wire. I don't think it would hurt to authenticate more than
> this, e.g., other fields that the sender and receiver need to agree on.
>

FWIW, if the consensus of the group were to authenticate both the
"pseudoheader information" and the bits on the wire, I could potentially
live with that.

My rank ordering of options I consider potentially acceptable is:

1. Ban implciit CIDs.
2. Authenticate both the wire format and the abstract information.

I am strongly opposed to authenticating only the abstract information.

-Ekr

P.S. QUIC uses the same implicit length mechanism, so we should form a
common theory.


> Chris P.
>