Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

Russ Housley <housley@vigilsec.com> Tue, 12 December 2023 17:15 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D4ABC48CB11 for <tls@ietfa.amsl.com>; Tue, 12 Dec 2023 09:15:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QjfOs6SFs8-y for <tls@ietfa.amsl.com>; Tue, 12 Dec 2023 09:15:47 -0800 (PST)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 847EFC48CB10 for <tls@ietf.org>; Tue, 12 Dec 2023 09:15:47 -0800 (PST)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id E520C1854CB; Tue, 12 Dec 2023 12:15:46 -0500 (EST)
Received: from smtpclient.apple (unknown [96.241.2.243]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id D474018571A; Tue, 12 Dec 2023 12:15:46 -0500 (EST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <1e14ee74-4785-4cda-a526-c867ef363080@huitema.net>
Date: Tue, 12 Dec 2023 12:15:36 -0500
Cc: IETF TLS <tls@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <044A015B-CC86-455A-9D50-8B9B5365029E@vigilsec.com>
References: <CAOgPGoCV9VQD+hqtorrRGi8+2V6dHfKr_ifAwUzECLVzJE=ZHQ@mail.gmail.com> <BB200250-77AA-4806-B533-213DC4DEDA1E@vigilsec.com> <CABcZeBMTThLys1o4RXiP5ToPc88Z6UygW9END55KSOH3Nwc5pg@mail.gmail.com> <CAFR824x6ASngZxf_K8C4oWQdT59oKYAK5QX5eAwpodFNTT80kw@mail.gmail.com> <CAFR824wL=bmz_Mr_UrOPWr7Xp1fDYnfkaUpfvcfP0Lb8Cuy7cQ@mail.gmail.com> <CABcZeBMDLUfoJh9hc78jL74jq2=pRaukvo3ctnX+Xw9pv0PG_A@mail.gmail.com> <93A1B9BC-7AC8-4143-8614-FB1ED2E52773@vigilsec.com> <9186a0f4-f74a-4a8f-b246-943715f97219@huitema.net> <56096300-A5CE-4DC1-BC71-04207B39A365@vigilsec.com> <4bf745ad-b325-4fc7-b193-7534c1e8d45a@huitema.net> <605246FD-E5E3-4395-A423-17B5E1842D1C@vigilsec.com> <1e14ee74-4785-4cda-a526-c867ef363080@huitema.net>
To: Christian Huitema <huitema@huitema.net>
X-Mailer: Apple Mail (2.3731.700.6)
X-Scanned-By: mailmunge 3.11 on 66.39.134.11
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/T3RdBTiuBOCHuE3QtQdd54vCu_4>
Subject: Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Dec 2023 17:15:54 -0000

Christian:

>>> 
>>> Thanks. I am not 100% sure that we actually have an attack against the [EC]DH+PSK combination, but I am confident than if the PSK secret is weak, the attacker can get to the early data. If only for that, it is prudent to use long enough PSK.
>> As stated in draft-ietf-tls-8773bis, some people are interested in using the external PSK with a certificate to protect against the future invention of a Cryptographically Relevant Quantum Computer (CRQC).  Others want to use of a public key with a factory-provisioned secret value for the initial enrollment of a device in an enterprise network (for example draft-ietf-emu-bootstrapped-tls).
>> For the security consideration, I suggest an additional paragraph:
>>         Implementations must use sufficiently large external PSKs.  For protection
>>         against the future invention of a CRQC, the external PSK needs to be at
>>         least 256 bits.
>> Does that resolve your concern?
> 
> Yes.


I think there is a companion point to be made.  I suggest:

   Implementations must use a ciphersuite that includes a symmetric
   encryption algorithm with sufficiently large keys.  For protection
   against the future invention of a CRQC, the symmetric key needs to be
   at least 256 bits.

   Implementations must use sufficiently large external PSKs.  For
   protection against the future invention of a CRQC, the external PSK
   needs to be at least 256 bits.

Russ