[TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt
Björn Haase <bjoern.haase@endress.com> Mon, 17 March 2025 09:09 UTC
Return-Path: <bjoern.haase@endress.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id E33CFCD1980 for <tls@mail2.ietf.org>; Mon, 17 Mar 2025 02:09:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=endress.com header.b="HSoHMk9h"; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=endress.com header.b="l1dV1cm9"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 34KazPl4l639 for <tls@mail2.ietf.org>; Mon, 17 Mar 2025 02:09:50 -0700 (PDT)
Received: from AS8PR04CU009.outbound.protection.outlook.com (mail-westeuropeazon11011015.outbound.protection.outlook.com [52.101.70.15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id DBBC8CD196D for <tls@ietf.org>; Mon, 17 Mar 2025 02:09:49 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=fail; b=gvL7tw+JCskBXG1spx0gZMxWKa1W7auWOFuJtbeGzwWgUskOhmEk56divYMjFNCWgK4NEUNDw2hgwvegHf2T70fOCdkUkYzFFWSB9s+v2pjHdNZ2756trijDJmqoZQ1A0AHhR0x1k19QoceKRsueNT3ETO7DWtV4na3vLTUAiOSBcCQxBph5laf4WBDcRQti3gOZsKHVK0LfV/Q8T2lDOFteZNwrWfZsWadWYXNJzPllsL0dg2Aqx9ioyoIwuiCqnJZmDpg2i8L+/sf9unB4TmspBYu6tWzfytyEZta39PpCIOpgKabZvmuKFX6zwNrGasNAzd0IJ1HCgcvtRoiumQ==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=R1tV93pfV4RWKt436dAEMgJlTRrBzJ63uGPA2s7hnP4=; b=SRPBeHpiTKxJbR5W372GgE2TiBoSCp6GJfw81KwrgJpigWKpzUqDLrs4EYLWODAWWkIoWMA+6H32FEa6lsO8l2vLRESqtyPoxNasPOqB0VvqO8Av1pm4O9KUyROtcKbhyNB33HK8pr6vvwsVOxTSchBSakeiOxzUPKV4tE/ZR4BWdBOKHV+kEBhIke1o2GCnWCIYgxRw18gewi9oEJVrcmr5qP/OFwTmj5z8AYJMsZXrHzdMWxmZIMmZ0m6HiSKa7rIQqKgP5lkdPYTk+868bR4FD63yJ7Mx3WFcOwtWjQo/2TlNqZoxsRoY4A1pLjlVwbe1iv+Uc6i8X5Y81hExOA==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 20.234.88.31) smtp.rcpttodomain=ietf.org smtp.mailfrom=endress.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=endress.com; dkim=fail (body hash did not verify) header.d=endress.com; arc=fail (47)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=endress.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=R1tV93pfV4RWKt436dAEMgJlTRrBzJ63uGPA2s7hnP4=; b=HSoHMk9hiTK4DAIL2usmCl/bNm+U64vs0K9khuQaLJhz5RnSZ/3IdKJbPJkwwgP71+oGCE9kI0s+ZS4lEin7WR+yClNz4Rq7Ju0trAjo/zzx4qtZRrNIEwzxy6IlW5O4tf+yxsAcY9SJyFOLksa/LPM2TzpI7CRdk3HeC3O+W4c=
Received: from AS9PR06CA0256.eurprd06.prod.outlook.com (2603:10a6:20b:45f::7) by VI0PR05MB11256.eurprd05.prod.outlook.com (2603:10a6:800:20d::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.33; Mon, 17 Mar 2025 09:09:47 +0000
Received: from AMS1EPF00000040.eurprd04.prod.outlook.com (2603:10a6:20b:45f:cafe::86) by AS9PR06CA0256.outlook.office365.com (2603:10a6:20b:45f::7) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8534.33 via Frontend Transport; Mon, 17 Mar 2025 09:09:47 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 20.234.88.31) smtp.mailfrom=endress.com; dkim=fail (body hash did not verify) header.d=endress.com;dmarc=pass action=none header.from=endress.com;
Received-SPF: Pass (protection.outlook.com: domain of endress.com designates 20.234.88.31 as permitted sender) receiver=protection.outlook.com; client-ip=20.234.88.31; helo=iqsuite.endress.com; pr=C
Received: from iqsuite.endress.com (20.234.88.31) by AMS1EPF00000040.mail.protection.outlook.com (10.167.16.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.20 via Frontend Transport; Mon, 17 Mar 2025 09:09:46 +0000
Received: from EUR03-AM7-obe.outbound.protection.outlook.com ([104.47.51.233]) by iqsuite.endress.com over TLS secured channel with Microsoft SMTPSVC(10.0.17763.1697); Mon, 17 Mar 2025 10:09:44 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=r1AJkhdz9xDHKdtwlW3yFGIFWOJXinYXWFRavppKtCy97+ityygD+T/veNe8kEfElSSsd8e/UYeqYNsJX1ckxtqT30fUKfEsv7lwOYTDMZv52/8H82pyK5Kfhaj+uIrdYwOu0B1kTJFPmmCfkOi4EKt063ai6gS1zQPzqZ8fQiIiYH5XbQsoFYc5JXuvNIweIy+irczELcmGzPoIpNBvOllxyycwN7fR4mMcvyr8li2m/VnX12hHabqaPDUkDUADPjLfo9HzneCbiVMAWNhlT5DLPKAcJ1RLwrQV8e6QDfmeM4iXUP22EWFfMpnjwSfoZqeHN9fu7bcjEdL1b8lrHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IACzpBlJzrroMpyfZz9xZVR8Ky2XaUARkIC9r/6EAKw=; b=O0fzmh/IMgSwVLdL8hpBx9+slG+tGXNrfjvDf3LpXRKRntLmM845HJ5ZZ/5rKrk5P/pqt1WW07b8cOrExlblu2NTvSdnqdEiCfWeCn3qIjknSUPSxk5MC3VSDAbEpdgS4KlwvH7S7lzgBH7RQaAUdcXFGSoFJy50GxFqPxO1CkdcevFjrNUXf8JHeyDGCw5a5MulE296j2eAuAz0KmTg69En4oMTL+LaN7hQJx+E5OUa8+fnPBBk7s3TTmplr+6YDqEv5ANfTtTogqIN8fJcXak0i+AEmiGGIThHXPqqk4G8JtNB5FeEaVSLh+W2S2OUyZk7W+MPoa0ZucMBKPsCTw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=endress.com; dmarc=pass action=none header.from=endress.com; dkim=pass header.d=endress.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=endress.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IACzpBlJzrroMpyfZz9xZVR8Ky2XaUARkIC9r/6EAKw=; b=l1dV1cm9W7rMG7kM8wO47Wn0p1ha0YCsBYmzMzNDms8SmM96hdQ8jMIt8hATwSYsWxVZwVEqNpghdOrLGi9tchCT+1XA8Pv+BnFI8b1iLiiUKA5s6fN4+AdjAAK7J6QIhLz59guK3D3sG2ONLNRNXawzWbmG3V2pIe3UU5qmcZY=
Received: from DU0PR05MB9720.eurprd05.prod.outlook.com (2603:10a6:10:410::6) by AS8PR05MB8342.eurprd05.prod.outlook.com (2603:10a6:20b:3cd::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.33; Mon, 17 Mar 2025 09:09:43 +0000
Received: from DU0PR05MB9720.eurprd05.prod.outlook.com ([fe80::61ad:9819:81cf:372c]) by DU0PR05MB9720.eurprd05.prod.outlook.com ([fe80::61ad:9819:81cf:372c%6]) with mapi id 15.20.8534.031; Mon, 17 Mar 2025 09:09:43 +0000
From: Björn Haase <bjoern.haase@endress.com>
To: Eric Rescorla <ekr@rtfm.com>, Rob Sayre <sayrer@gmail.com>
Thread-Topic: [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt
Thread-Index: AQHblqSqiKGbMcHwFUqEXnzE9cYZN7N2ZXOAgACGeOA=
Date: Mon, 17 Mar 2025 09:09:42 +0000
Message-ID: <DU0PR05MB9720446D1B40AE7A732F7D5383DF2@DU0PR05MB9720.eurprd05.prod.outlook.com>
References: <05B28816-9AA9-4035-B451-8ACFFBE2D4DE@apple.com> <CAChr6Sy1Eew1J5z9at3qEwLRWn+7ZLm0f564LobNQGMD7ANQaA@mail.gmail.com> <CABcZeBOpk2cYAyie4=G5=c6V43HvGB70fKVf_e_bQqnt_4C9WQ@mail.gmail.com>
In-Reply-To: <CABcZeBOpk2cYAyie4=G5=c6V43HvGB70fKVf_e_bQqnt_4C9WQ@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_ActionId=cb9e0245-6ea4-4a9f-9528-625d9c7fa270;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_ContentBits=0;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_Enabled=true;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_Method=Standard;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_Name=2988f0a4-524a-45f2-829d-417725fa4957;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_SetDate=2025-03-17T07:17:12Z;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_SiteId=52daf2a9-3b73-4da4-ac6a-3f81adc92b7e;MSIP_Label_2988f0a4-524a-45f2-829d-417725fa4957_Tag=10, 3, 0, 1;
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=endress.com;
x-ms-traffictypediagnostic: DU0PR05MB9720:EE_|AS8PR05MB8342:EE_|AMS1EPF00000040:EE_|VI0PR05MB11256:EE_
X-MS-Office365-Filtering-Correlation-Id: 18b5f5d9-77cf-46f0-d766-08dd6533766b
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230040|1800799024|376014|4022899009|366016|8096899003|13003099007|38070700018;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU0PR05MB9720.eurprd05.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(4022899009)(366016)(8096899003)(13003099007)(38070700018);DIR:OUT;SFP:1101;
Content-Type: multipart/alternative; boundary="_000_DU0PR05MB9720446D1B40AE7A732F7D5383DF2DU0PR05MB9720eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR05MB8342
X-OriginalArrivalTime: 17 Mar 2025 09:09:44.0989 (UTC) FILETIME=[534B64D0:01DB971C]
X-iqsuite-process: processed
X-Trailer: 1
X-iqsuite-SMTP: 1
X-GBS-PROC: v9eEUNycmMdmBm/I8GqHLxFE2Z/F78PMnMh5MamABSRZrp/xF3ZMds6+nhA1zrDs
X-GBS-PROCJOB: g5HP0csP9HHnMwDurg9YdAxLIqQ9Jq17vK25l9tPuoaawu7ohgB5z7hjY0hVQ+xe
X-GRP-TAN: CNEUEHS0018@7389967ABB514AE6AB44E5EB235ECD83
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS1EPF00000040.eurprd04.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: badd37cf-b8a3-4a6e-a83f-08dd6533749a
X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|4022899009|36860700013|1800799024|14060799003|35042699022|376014|8096899003|13003099007;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:20.234.88.31;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:iqsuite.endress.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(4022899009)(36860700013)(1800799024)(14060799003)(35042699022)(376014)(8096899003)(13003099007);DIR:OUT;SFP:1101;
X-OriginatorOrg: endress.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2025 09:09:46.0213 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 18b5f5d9-77cf-46f0-d766-08dd6533766b
X-MS-Exchange-CrossTenant-Id: 52daf2a9-3b73-4da4-ac6a-3f81adc92b7e
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=52daf2a9-3b73-4da4-ac6a-3f81adc92b7e;Ip=[20.234.88.31];Helo=[iqsuite.endress.com]
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TreatMessagesAsInternal-AMS1EPF00000040.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI0PR05MB11256
Message-ID-Hash: NUJQNLQOD3EGET3R7TYMICVB6JVXOYCK
X-Message-ID-Hash: NUJQNLQOD3EGET3R7TYMICVB6JVXOYCK
X-MailFrom: bjoern.haase@endress.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Laura Bauman <l_bauman=40apple.com@dmarc.ietf.org>, "tls@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Haff2qgLvgQfj981q6vJMZNJWbc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Hi Laura, Hi all,
I plan to come up with a more detailed review of the draft this week together with description of the actual use-cases. In our company’s setting the main use-case for PAKE are customer-owned server devices that are not yet integrated in a PKI and yet not integrated with other authentication protocol ecosystems (such as OAuth).
One important use-case relates to networks that may be wire-gapped and air-gapped from central authentication server structures for extended times.
Also in our setting the most important aspect for use of TLS is used outside of the scope of browsers where the PAKE protocol component within TLS can be given direct access to some limited user interface for the purpose of authentication.
>Regardless of the point above, I do not believe this would work. You need some protocol to carry the PAKE information and if that's not going in the TLS >handshake, where is it going?
My main objection regarding the draft will boil down to the above conclusion by Eric. I believe that we need a mechanism to carry the PAKE protocol-variant specific information gets integrated as part of the TLS handshakes as only with this we will be enabling secure use of PAKE protocols such as OPAQUE or CPace. When preparing PAKE for TLS I think that we really should prepare the structure of the messages such that protocols such as OPAQUE and CPace are not effectively ruled out because information beyond “identity” identifiers needs to be exchanged or because “identity” identifiers such as server-identity identifiers might only become available after receiving the ServerHello.
Find below the P.S. a more comprehensive attempt of describing my ideas on how this could be made working.
Yours,
Björn
P.S.
This will mean that I believe that for viable integration into TLS we would have to prepare an internal PakeProtocolVariantComponent-To-TlsCoreComponent API structure.
I believe that similar to the actual specification on how to implement certificate trust chain evaluations on the client *for* TLS we would be having PakeProtocolVariantComponent somewhat separated from TlsCoreComponent part.
- In the API between the two components the PakeProtocolVariant component would be providing the shared session secret to the TlsCoreComponent after two flows and would also responsible for carrying out the PAKE-protocol equivalent of what is the “certificate trust-chain check” in PKI.
- The TLS core component would allow for PAKE-protocol-variant-specific payload fields in the client-hello and server hello messages and would be arranging for the bulk message payload encryption after successful authentication and shared session secret derivation.
Depending on the protocol type, the PakeProtocolVariant component might require to exchange information which could be all of: “user names”, “PBKDF functions for memory-hard password-verifier hashing”, “OPRF challenge”, “Salt values used for PBKDF”, “OPAQUE AKE protocol variant” or “elliptic curve group choice” handshake information.
(Even if some of this pake-protocol-variant-specific information would benefit from encryption for some PAKE protocols, I believe that we might have to leave the implementation of an encrypted client hello outside of the scope of a TLS-PAKE extension and use mechanisms such as the existing “encrypted client hello” concepts if needed. In many settings clear-text transfer of the PAKE-protocol-specific information can be considered acceptable IMO, though.)
After thinking through design options I personally came to the conclusion that the theoretically possible approach of re-allowing arbitrary EAP subprotocols for this purpose -- such as was allowed in TLS 1.2 -- is not an advisable approach for TLS 1.3. I believe that this likely would become a nightmare regarding interoperability and also regarding security analysis regarding TLS1.3.
In order to avoid the issues that come with possibly overly flexible constructions such as EAP, I’d advocate to really concentrate on really *few* PAKE protocols for integration in TLS based on the actual use-cases. I am completely with Scott Fluhrer with the assessment that SPAKE2+ might not actually be the choice to recommend for TLS 1.3.
I believe that actually regarding the use-cases we might be having only two use-cases (balanced PAKE and augmented PAKE) and might actually only be recommending two or three PAKE protocols.
Regarding the interfaces between TlsCoreComponent and PakeProtocolVariant -modules:
I believe that for PAKE integration to TLS we need to prepare a more flexible mechanism for PAKE-protocol-variant meta-information *within* the client and server hello messages.
The requirement to impose for support for TLS integration regarding the PAKE protocol would be to request that after completing the client- and server-hello messages the shared secret for the session has to be established leaving only the final key confirmation by the client to the third message flow. I.e. we would be imposing the requirement that for suitability for TLS a PAKE protocol must not change the three-message-flow structure.
As different PAKE protocols will require *very* different information to be piggy-backed with the client and server hello messages the approach that I suggest is to allow for embedded container fields within the client and server hello messages which need to become PAKE-protocol specific and will have to contain all PAKE-protocol-variant specific parts. I would rather not recommend to consider flattening exchanged information already plainly as individual fields on the hierarchy level of the ClientHello and ServerHello such as suggested by the draft.
I.e. I believe that for a suitable TLS integration we rather should consider embed a pake-protocol-flavor specific data field into the ClientHello and ServerHello which bundles all required information for a specific PAKE protocol variant. I.e. one would be having something like the following:
ClientHello:
{
Advertises support for PAKE protocols SPAKE2+ and OPAQUE,
CBorEncodedSpecificInformationForSpake2+ {IdentityFieldClient, SPAKE CurveGroupList, BlindedECDHPublicShareServerForPreferredCurve},
CBorEncodedSpecificInformaitonForOpaque{UserName, OPRF CurveGroup, OPRF challenge, AKE_Message1},
…
}
As a response servers supporting different protocol variants might respond either with
ServerHello-from-a-server-supporting-OPAQUE:
{
Support for PAKE protocol OPAQUE,
CBorEncodedSpecificInformationForOpaque{OPRF response, OPRF CurveGroup, PBKDF-Function to use for password verifier, Parametrization of PBKDF for memory hard hashing, Encrypted certificate, AKE_Message2},
…
}
or alternatively the response from a server supporting SPAKE2+ would look like
ServerHello-from-a-server-supporting-SPAKE2+:
{
Support for PAKE protocol SPAKE2+,
CBorEncodedSpecificInformationForSPAKE2+{IdentityFieldServer, CurveGroup BlindedECDHPublicShareServer },
…
}
Most probably for PAKE the protocol specific fields would best be encoded according to CBOR or DER encoding rules according to some schema as one embedded block and rather
not by using individual fields flatly on the level of the ClientHello and ServerHello.
So summing up: I believe that for a viable PAKE extension we need a general structure in TLS that first advertises support for a specific set of PAKE protocols in the ClientHello and where we prepare pake-protocol specific container fields embedded in the ClientHello and ServerHello messages. The draft should be specifying that after the Server-Hello messages both sides have the shared session key secret available and will provide authentication/identity information to both parties such that the PAKE equivalent of a “trusted certificate chain evaluation” for a PKI can be carried out.
I.e. the main change in the TLS specification might be that we more clearly define API interfaces between the
1) … authentication and shared session-secret establishment component and the …
2) … bulk payload message authentication and encryption components working with the shared session secret …
where
PAKE may provide an alternative to ECDH and Certificates for component 1).
Already today’s component for 1) (ECDH and Certificates) interfaces to some component external to the TLS core component for the purpose of certificate-trust-chain data base access and trust-chain checks.
In the case of PAKE TLSO we would also have to interface to an external component, however in this case this might involve an interface to some user credentials database on the server side and a GUI component for the client side.
Yours,
Björn
Mit freundlichen Grüßen | Best Regards
Dr. Björn Haase
Senior Expert Electronics | TGREH Electronics Hardware
Endress+Hauser Liquid Analysis
Endress+Hauser Conducta GmbH+Co. KG | Dieselstrasse 24 | 70839 Gerlingen | Germany
Phone: +49 7156 209 10377
bjoern.haase@endress.com | www.ehla.endress.com
Endress+Hauser Conducta GmbH+Co.KG
Amtsgericht Stuttgart HRA 201908
Sitz der Gesellschaft: Gerlingen
Persönlich haftende Gesellschafterin:
Endress+Hauser Conducta Verwaltungsgesellschaft mbH
Sitz der Gesellschaft: Gerlingen
Amtsgericht Stuttgart HRA 201929
Geschäftsführer: Dr. Manfred Jagiella
Gemäss Datenschutzgrundverordnung sind wir verpflichtet, Sie zu informieren, wenn wir personenbezogene Daten von Ihnen erheben.
Dieser Informationspflicht kommen wir mit folgendem Datenschutzhinweis (https://www.endress.com/de/cookies-endress+hauser-website) nach.
Disclaimer:
The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential, proprietary, and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you receive this in error, please contact the sender and delete the material from any computer. This e-mail does not constitute a contract offer, a contract amendment, or an acceptance of a contract offer unless explicitly and conspicuously designated or stated as such.
Von: Eric Rescorla <ekr@rtfm.com>
Gesendet: Montag, 17. März 2025 00:16
An: Rob Sayre <sayrer@gmail.com>
Cc: Laura Bauman <l_bauman=40apple.com@dmarc.ietf.org>; tls@ietf.org
Betreff: [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt
On Sun, Mar 16, 2025 at 11:52 AM Rob Sayre <sayrer@gmail.com<mailto:sayrer@gmail.com>> wrote:
On Sat, Mar 15, 2025 at 7:21 PM Laura Bauman <l_bauman=40apple.com@dmarc.ietf.org<mailto:40apple.com@dmarc.ietf.org>> wrote:
Thanks to everyone that has taken a look at draft-bmw-tls-pake13-01.txt and provided feedback so far. As more people start reading it, I wanted to clarify that the current draft version does not yet reflect the change we intend to make to allow Certificates and the pake extension to be used together. We’ve filed a GitHub issue here tracking our intent to change this: https://github.com/chris-wood/draft-bmw-tls-pake13/issues/25.
I'm pretty sure this is not news to authors, but I've thought about this one before (when the IRTF was conducting their PAKE contest). It seems like using both PAKE and certificates together, in combination with "Sign In" products would be pretty powerful. I am not sure why this draft needs TLS extensions, and it doesn't cover the thorny problem of PAKE registration at all.
Leaving the question of registration aside, I don't believe that PAKEs are really viable in the Web context, for two reasons:
- Sites in general want to control the login experience and this means having the password typed in in a box they control, not in the browser UI, especially given the current terrible state of password UIs for browsers.
- In the phishing context, the attacker site can just prompt the user directly for their password or simulate the PAKE UI, thus bypassing the PAKE. The whole premise of phishing is that the user doesn't check carefully, so I don't think we can rely on users to detect this form of attack.
We already have phishing resistant authentication mechanisms such as WebAuthn which don't have this problem, so I think the motivation for PAKEs on the Web is pretty weak.
Couldn't it be click "Sign In", and start the TLS key schedule from there, instead of "0"? No extensions necessary.
Regardless of the point above, I do not believe this would work. You need some protocol to carry the PAKE information and if that's not going in the TLS handshake, where is it going?
-Ekr
I decided not to work on this problem, because I figured it would make a lot of people mad, and I didn't want to spend my time on it. But, might as well ask the question since we have this draft in front of us.
thanks,
Rob
_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-leave@ietf.org<mailto:tls-leave@ietf.org>
- [TLS] Feedback on draft-bmw-tls-pake13-01.txt Laura Bauman
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Rob Sayre
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Eric Rescorla
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt David Benjamin
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Björn Haase
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Rob Sayre
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Eric Rescorla
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Rob Sayre
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Eric Rescorla
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Rob Sayre
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Rob Sayre
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Laura Bauman
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Rob Sayre
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Christopher Patton
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Eric Rescorla
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Christopher Patton
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Eric Rescorla
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Martin Thomson
- [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt Eric Rescorla