Re: [TLS] PRs for this morning

Manuel Pégourié-Gonnard <mpg@polarssl.org> Thu, 13 November 2014 20:22 UTC

Return-Path: <mpg@polarssl.org>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5648D1ACF8D for <tls@ietfa.amsl.com>; Thu, 13 Nov 2014 12:22:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.397
X-Spam-Level:
X-Spam-Status: No, score=0.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_MISMATCH_COM=0.553, HOST_EQ_NL=1.545, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E_hSndjiLzQ0 for <tls@ietfa.amsl.com>; Thu, 13 Nov 2014 12:21:59 -0800 (PST)
Received: from vps2.offspark.com (vps2.brainspark.nl [141.138.204.106]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A700F1AD004 for <tls@ietf.org>; Thu, 13 Nov 2014 12:21:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=polarssl.org; s=exim; h=Subject:Content-Transfer-Encoding:Content-Type:In-Reply-To:References:CC:To:MIME-Version:From:Date:Message-ID; bh=ZDVeYLxv2lVBYhoYmZ66+fYmny1gK0cUBRbFTLIcpD4=; b=UoqmGpqo684e5ZpaJSOUsfPMBs5/aeTcrpNgwKbk/vlAAQ01b2SY+ny2wXuwxayPM0o1hq7OFXU+3nFBohLXoHlehAPb667WlYkgxESxl16wQjg4pj6tPugGz9gz5P1biaSgLAsseQZdwrZ3ZPdFJ20J0ptBJHd6EWsC9/yt8vc=;
Received: from mna75-11-88-161-199-191.fbx.proxad.net ([88.161.199.191] helo=[192.168.0.12]) by vps2.offspark.com with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <mpg@polarssl.org>) id 1Xp0sw-00008i-Ar; Thu, 13 Nov 2014 21:20:54 +0100
Message-ID: <546512AB.903@polarssl.org>
Date: Thu, 13 Nov 2014 21:20:59 +0100
From: Manuel Pégourié-Gonnard <mpg@polarssl.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: mrex@sap.com, Eric Rescorla <ekr@rtfm.com>
References: <20141113200037.455711AFCB@ld9781.wdf.sap.corp>
In-Reply-To: <20141113200037.455711AFCB@ld9781.wdf.sap.corp>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 88.161.199.191
X-SA-Exim-Mail-From: mpg@polarssl.org
X-SA-Exim-Version: 4.2.1 (built Mon, 26 Dec 2011 16:24:06 +0000)
X-SA-Exim-Scanned: Yes (on vps2.offspark.com)
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/YHkxYbf3aGcJVAaXkhKcAAzFwWM
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] PRs for this morning
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Nov 2014 20:22:00 -0000

On 13/11/2014 21:00, Martin Rex wrote:
> Eric Rescorla wrote:
>>
>> Merging session resumption and tickets and moving ticket
>> establishment to a update:
>> https://github.com/tlswg/tls13-spec/pull/96
> 
> 
> In case that you intend to add rfc5077 TLS session ticket support
> to TLSv1.3, is that using the same bogus CBC-Encryption
> (i.e. mac+pad+encrypt instead of pad+mac+encrypt) that Vaudenay
> described as a security issue, that was never fixed in TLS up to v1.2
> and provided the grounds for LuckyThirteen and Poodle?
> 
I'm not sure what you're talking about. To me, RFC 5077 section 4 looks like it
recommends pad+encrypt+mac (aka EEM) which is secure.

   The actual state information in encrypted_state is encrypted using
   128-bit AES in CBC mode with the given IV.  The Message
   Authentication Code (MAC) is calculated using HMAC-SHA-256 over
   key_name (16 octets) and IV (16 octets), followed by the length of
   the encrypted_state field (2 octets) and its contents (variable
   length).

Manuel.