Re: [TLS] Issue 49: Finished.verify length
Bodo Moeller <bmoeller@acm.org> Fri, 14 September 2007 12:03 UTC
Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IW9tT-00054Y-BD; Fri, 14 Sep 2007 08:03:31 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IW9tS-00054S-6N for tls@ietf.org; Fri, 14 Sep 2007 08:03:30 -0400
Received: from moutng.kundenserver.de ([212.227.126.171]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IW9tQ-0002y7-RL for tls@ietf.org; Fri, 14 Sep 2007 08:03:30 -0400
Received: from [134.147.40.246] (helo=tau.invalid) by mrelayeu.kundenserver.de (node=mrelayeu1) with ESMTP (Nemesis), id 0MKwpI-1IW9t91D7C-0002G9; Fri, 14 Sep 2007 14:03:26 +0200
Received: by tau.invalid (Postfix, from userid 1000) id CD6A71AF29; Fri, 14 Sep 2007 14:03:10 +0200 (CEST)
Date: Fri, 14 Sep 2007 14:03:10 +0200
From: Bodo Moeller <bmoeller@acm.org>
To: Pasi.Eronen@nokia.com
Subject: Re: [TLS] Issue 49: Finished.verify length
Message-ID: <20070914120310.GA29073@tau.invalid>
References: <20070914090853.GA20702@tau.invalid> <B356D8F434D20B40A8CEDAEC305A1F2404937712@esebe105.NOE.Nokia.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F2404937712@esebe105.NOE.Nokia.com>
User-Agent: Mutt/1.5.9i
X-Provags-ID: V01U2FsdGVkX1/RLWUZJH84zvwgMnJDVskK1C348FNd2Y9BW/E YHTSPBJqhdZN415XJKWJ1jPoHE9UrI5UkQuShYk7XIA4CVperY Ynb8TD5QaHyOzy4jsnviS1wfGQM+GooRfuGUhjSh17yc2PaLD5 ELw==
X-Spam-Score: -0.0 (/)
X-Scan-Signature: 52e1467c2184c31006318542db5614d5
Cc: tls@ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org
On Fri, Sep 14, 2007 at 02:40:11PM +0300, Pasi.Eronen@nokia.com wrote: > Bodo Moeller wrote: >> But you don't need a very long verify_data. We also don't need >> very long record-layer MACs. Both are needed only for real-time >> authentication, which cannot be attacked after the fact. > This is true; but reasonable people seem to have different opinions > on what exactly is "sufficiently long". For example, RFC 4106 specifies > three different choices for ICV (MAC) length (128/192/256 bits). IPsec is a different setting since it is not based on streams (which would be aborted in case of a decryption error). However, this reminds me to take DTLS into account, so yes, we possibly might need long record-layer MACs (just for consistency for DTLS, not for actual TLS security reasons). Of course, the Finished message payload (verify_data) still will have to be processed just once. (An incorrect record-layer MAC is just a reason to discard this particular packet in DTLS, but if the record-layer MAC is correct and the verify_data isn't, then this is a very bad sign, and the session should be canceled.) > My suggestion was *not* to increase the current length, but rather > to add "agility" for this parameter as well (so that we don't > need to revisit the TLS base spec if, e.g., some future cipher > suite wants to have all the pieces at 256-bit level). OK, this makes perfect sense! The question as cited here was, should the verify_data length depend *on the PRF*. It shouldn't; but that doesn't mean we can't allow individual ciphersuites to specify their preferred verify_data lengths. Bodo _______________________________________________ TLS mailing list TLS@lists.ietf.org https://www1.ietf.org/mailman/listinfo/tls
- [TLS] Issue 49: Finished.verify length Eric Rescorla
- Re: [TLS] Issue 49: Finished.verify length Mike
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- Re: [TLS] Issue 49: Finished.verify length Mike
- Re: [TLS] Issue 49: Finished.verify length Bodo Moeller
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Bodo Moeller
- Re: [TLS] Issue 49: Finished.verify length Bodo Moeller
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Russ Housley