Re: [TLS] I-D Action: draft-ietf-tls-negotiated-ff-dhe-02.txt

Watson Ladd <watsonbladd@gmail.com> Sat, 25 October 2014 19:56 UTC

Return-Path: <watsonbladd@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77D0A1A6EDC for <tls@ietfa.amsl.com>; Sat, 25 Oct 2014 12:56:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.078
X-Spam-Level:
X-Spam-Status: No, score=-1.078 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RAZOR2_CHECK=0.922, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DcgcI-5DnRww for <tls@ietfa.amsl.com>; Sat, 25 Oct 2014 12:55:59 -0700 (PDT)
Received: from mail-yh0-x234.google.com (mail-yh0-x234.google.com [IPv6:2607:f8b0:4002:c01::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 220D61A1AB8 for <tls@ietf.org>; Sat, 25 Oct 2014 12:55:59 -0700 (PDT)
Received: by mail-yh0-f52.google.com with SMTP id f10so2800730yha.25 for <tls@ietf.org>; Sat, 25 Oct 2014 12:55:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=5mRUb+Bmw59HjrW/bEY+bwfw0JlXK5gxYpSqZdd4vR8=; b=Nn3UEjYJz16LsMUf+FFnNJefas18T4ArLzWmw16tCz68ILMJcJf+W1gEItcCzsW9IN oNCI845w9s3f2dPdWPY73wPVc1UvPj8D6QyTJMOBPrTRfD/eYKHyqO+mEeXI0w7uPLbk oXZPE4QqSWi0FbzLtd2gcjLvkR4lWCqWqPYA3hw62IjbFNCzvMoArUdM9yv20vRQrBOk f/7tSwbofV3Uf0jFSWIP7q5V1Qgnb1YHn62T04TwB74a065UcBLFBwh5fE7Mpr3nbfOi jUHnlwPgUFtBt4S5dnZ+1O2M+O3aspFE2+QS6jWNQReUJVZiaC7eG5csqzw1Y8e4pMsM 1pwQ==
MIME-Version: 1.0
X-Received: by 10.170.87.7 with SMTP id e7mr15717293yka.126.1414266958422; Sat, 25 Oct 2014 12:55:58 -0700 (PDT)
Received: by 10.170.195.149 with HTTP; Sat, 25 Oct 2014 12:55:58 -0700 (PDT)
In-Reply-To: <1682594903.63043.1414266713793.JavaMail.zimbra@redhat.com>
References: <20141011044948.27553.93984.idtracker@ietfa.amsl.com> <5438B82B.6090600@fifthhorseman.net> <544BD3BF.9030702@streamsec.se> <1682594903.63043.1414266713793.JavaMail.zimbra@redhat.com>
Date: Sat, 25 Oct 2014 12:55:58 -0700
Message-ID: <CACsn0ckWj2Jb65JN3mpABe0hC=ao3Bi7qQgUJYkUgzG9giAn8Q@mail.gmail.com>
From: Watson Ladd <watsonbladd@gmail.com>
To: Nikos Mavrogiannopoulos <nmav@redhat.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/KRk5HMKoEx_Lfx1ZQZ12Fn7h1tQ
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] I-D Action: draft-ietf-tls-negotiated-ff-dhe-02.txt
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Oct 2014 19:56:00 -0000

On Sat, Oct 25, 2014 at 12:51 PM, Nikos Mavrogiannopoulos
<nmav@redhat.com> wrote:
>> It seems to me the the recommended Client Behavior and Server Behavior
>> has to be simplified and strengthened, in order for the standard to meet
>> the security objectives.
>
> Could you elaborate on which security objectives are you referring to?
>
>> All relevant attacks here https://secure-resumption.com/ seem to involve
>> a MITM server that chooses bad ServerDHParams for the server key
>> exchange message.
>>    * Clearly, a MITM server might simply act as if it doesn't support
>> the "elliptic_curves" extension. The server does not include a reply to
>> the "elliptic_curves" extension in server_hello, so the client will not
>> receive any indication of lack of support, until it receives
>> server_key_exchange. At this point, the client might decide to terminate
>> the handshake if the ServerDHParams aren't acceptable. Checking an
>> arbitrary group by means of a binary compare, is only marginally harder
>> than checking a named group.
> [...]
>> A client that requires the use of FFDHE groups MUST perform a binary
>> compare of the ServerDHParams against the FFDHE group with the
>> corresponding modulus size, and MUST end the handshake with an
>> insufficient_security alert if the parameters do not match.
>
> What is the advantage of that proposal? It is more complex, and a security
> protocol should strive for simplicity. I see three disadvantages:
> 1. More bytes to send in a handshake, especially since we are talking about
> large groups (that also results to more memory used by implementations
> that have to cache those messages until the handshake is finished).
> 2. Instead of simple maps to known parameters, checks are needed adding more
> space for errors.
> 3. There are known attacks against the current ServerKeyExchange format which
> remain applicable if we go this path (a sufficiently long DH serverkeyexchange
> message can be parsed as an ECDH serverkeyexchage).

And 4: session_hash solves the same problem if I understand the
elements of it correctly, and we need it anyway because of this
ambiguity in parsing mentioned above. So do we even need this draft?

>
>
> Furthermore, I'd like to propose to further simplify the message for ServerDHParams
> used by the draft, and convert it to a deliberately incompatible format with the
> ServerDHParams as well ServerECDHParams. That way it can be ensured ensure that there
> cannot be any mitm taking advantage of the similarities.
>
> regards,
> Nikos
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls



-- 
"Those who would give up Essential Liberty to purchase a little
Temporary Safety deserve neither  Liberty nor Safety."
-- Benjamin Franklin