Re: [TLS] I-D Action: draft-ietf-tls-negotiated-ff-dhe-02.txt
Watson Ladd <watsonbladd@gmail.com> Sat, 25 October 2014 19:56 UTC
Return-Path: <watsonbladd@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77D0A1A6EDC for <tls@ietfa.amsl.com>; Sat, 25 Oct 2014 12:56:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.078
X-Spam-Level:
X-Spam-Status: No, score=-1.078 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RAZOR2_CHECK=0.922, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DcgcI-5DnRww for <tls@ietfa.amsl.com>; Sat, 25 Oct 2014 12:55:59 -0700 (PDT)
Received: from mail-yh0-x234.google.com (mail-yh0-x234.google.com [IPv6:2607:f8b0:4002:c01::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 220D61A1AB8 for <tls@ietf.org>; Sat, 25 Oct 2014 12:55:59 -0700 (PDT)
Received: by mail-yh0-f52.google.com with SMTP id f10so2800730yha.25 for <tls@ietf.org>; Sat, 25 Oct 2014 12:55:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=5mRUb+Bmw59HjrW/bEY+bwfw0JlXK5gxYpSqZdd4vR8=; b=Nn3UEjYJz16LsMUf+FFnNJefas18T4ArLzWmw16tCz68ILMJcJf+W1gEItcCzsW9IN oNCI845w9s3f2dPdWPY73wPVc1UvPj8D6QyTJMOBPrTRfD/eYKHyqO+mEeXI0w7uPLbk oXZPE4QqSWi0FbzLtd2gcjLvkR4lWCqWqPYA3hw62IjbFNCzvMoArUdM9yv20vRQrBOk f/7tSwbofV3Uf0jFSWIP7q5V1Qgnb1YHn62T04TwB74a065UcBLFBwh5fE7Mpr3nbfOi jUHnlwPgUFtBt4S5dnZ+1O2M+O3aspFE2+QS6jWNQReUJVZiaC7eG5csqzw1Y8e4pMsM 1pwQ==
MIME-Version: 1.0
X-Received: by 10.170.87.7 with SMTP id e7mr15717293yka.126.1414266958422; Sat, 25 Oct 2014 12:55:58 -0700 (PDT)
Received: by 10.170.195.149 with HTTP; Sat, 25 Oct 2014 12:55:58 -0700 (PDT)
In-Reply-To: <1682594903.63043.1414266713793.JavaMail.zimbra@redhat.com>
References: <20141011044948.27553.93984.idtracker@ietfa.amsl.com> <5438B82B.6090600@fifthhorseman.net> <544BD3BF.9030702@streamsec.se> <1682594903.63043.1414266713793.JavaMail.zimbra@redhat.com>
Date: Sat, 25 Oct 2014 12:55:58 -0700
Message-ID: <CACsn0ckWj2Jb65JN3mpABe0hC=ao3Bi7qQgUJYkUgzG9giAn8Q@mail.gmail.com>
From: Watson Ladd <watsonbladd@gmail.com>
To: Nikos Mavrogiannopoulos <nmav@redhat.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/KRk5HMKoEx_Lfx1ZQZ12Fn7h1tQ
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] I-D Action: draft-ietf-tls-negotiated-ff-dhe-02.txt
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Oct 2014 19:56:00 -0000
On Sat, Oct 25, 2014 at 12:51 PM, Nikos Mavrogiannopoulos <nmav@redhat.com> wrote: >> It seems to me the the recommended Client Behavior and Server Behavior >> has to be simplified and strengthened, in order for the standard to meet >> the security objectives. > > Could you elaborate on which security objectives are you referring to? > >> All relevant attacks here https://secure-resumption.com/ seem to involve >> a MITM server that chooses bad ServerDHParams for the server key >> exchange message. >> * Clearly, a MITM server might simply act as if it doesn't support >> the "elliptic_curves" extension. The server does not include a reply to >> the "elliptic_curves" extension in server_hello, so the client will not >> receive any indication of lack of support, until it receives >> server_key_exchange. At this point, the client might decide to terminate >> the handshake if the ServerDHParams aren't acceptable. Checking an >> arbitrary group by means of a binary compare, is only marginally harder >> than checking a named group. > [...] >> A client that requires the use of FFDHE groups MUST perform a binary >> compare of the ServerDHParams against the FFDHE group with the >> corresponding modulus size, and MUST end the handshake with an >> insufficient_security alert if the parameters do not match. > > What is the advantage of that proposal? It is more complex, and a security > protocol should strive for simplicity. I see three disadvantages: > 1. More bytes to send in a handshake, especially since we are talking about > large groups (that also results to more memory used by implementations > that have to cache those messages until the handshake is finished). > 2. Instead of simple maps to known parameters, checks are needed adding more > space for errors. > 3. There are known attacks against the current ServerKeyExchange format which > remain applicable if we go this path (a sufficiently long DH serverkeyexchange > message can be parsed as an ECDH serverkeyexchage). And 4: session_hash solves the same problem if I understand the elements of it correctly, and we need it anyway because of this ambiguity in parsing mentioned above. So do we even need this draft? > > > Furthermore, I'd like to propose to further simplify the message for ServerDHParams > used by the draft, and convert it to a deliberately incompatible format with the > ServerDHParams as well ServerECDHParams. That way it can be ensured ensure that there > cannot be any mitm taking advantage of the similarities. > > regards, > Nikos > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls -- "Those who would give up Essential Liberty to purchase a little Temporary Safety deserve neither Liberty nor Safety." -- Benjamin Franklin
- [TLS] I-D Action: draft-ietf-tls-negotiated-ff-dh… internet-drafts
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Daniel Kahn Gillmor
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Peter Gutmann
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Daniel Kahn Gillmor
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Peter Gutmann
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Peter Gutmann
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Alyssa Rowan
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Manuel Pégourié-Gonnard
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Geoffrey Keating
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Alyssa Rowan
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Stephen Checkoway
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Ilari Liusvaara
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Ilari Liusvaara
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Nikos Mavrogiannopoulos
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Watson Ladd
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Ilari Liusvaara
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Watson Ladd
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Nikos Mavrogiannopoulos
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Nikos Mavrogiannopoulos
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Nikos Mavrogiannopoulos
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Nikos Mavrogiannopoulos
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Ilari Liusvaara
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Henrick Hellström
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Daniel Kahn Gillmor
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Viktor Dukhovni
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Peter Gutmann
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Nikos Mavrogiannopoulos
- Re: [TLS] I-D Action: draft-ietf-tls-negotiated-f… Hubert Kario