Re: [TLS] Issue 49: Finished.verify length

Bodo Moeller <bmoeller@acm.org> Fri, 14 September 2007 12:03 UTC

Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IW9tT-00054Y-BD; Fri, 14 Sep 2007 08:03:31 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IW9tS-00054S-6N for tls@ietf.org; Fri, 14 Sep 2007 08:03:30 -0400
Received: from moutng.kundenserver.de ([212.227.126.171]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IW9tQ-0002y7-RL for tls@ietf.org; Fri, 14 Sep 2007 08:03:30 -0400
Received: from [134.147.40.246] (helo=tau.invalid) by mrelayeu.kundenserver.de (node=mrelayeu1) with ESMTP (Nemesis), id 0MKwpI-1IW9t91D7C-0002G9; Fri, 14 Sep 2007 14:03:26 +0200
Received: by tau.invalid (Postfix, from userid 1000) id CD6A71AF29; Fri, 14 Sep 2007 14:03:10 +0200 (CEST)
Date: Fri, 14 Sep 2007 14:03:10 +0200
From: Bodo Moeller <bmoeller@acm.org>
To: Pasi.Eronen@nokia.com
Subject: Re: [TLS] Issue 49: Finished.verify length
Message-ID: <20070914120310.GA29073@tau.invalid>
References: <20070914090853.GA20702@tau.invalid> <B356D8F434D20B40A8CEDAEC305A1F2404937712@esebe105.NOE.Nokia.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F2404937712@esebe105.NOE.Nokia.com>
User-Agent: Mutt/1.5.9i
X-Provags-ID: V01U2FsdGVkX1/RLWUZJH84zvwgMnJDVskK1C348FNd2Y9BW/E YHTSPBJqhdZN415XJKWJ1jPoHE9UrI5UkQuShYk7XIA4CVperY Ynb8TD5QaHyOzy4jsnviS1wfGQM+GooRfuGUhjSh17yc2PaLD5 ELw==
X-Spam-Score: -0.0 (/)
X-Scan-Signature: 52e1467c2184c31006318542db5614d5
Cc: tls@ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org

On Fri, Sep 14, 2007 at 02:40:11PM +0300, Pasi.Eronen@nokia.com wrote:
> Bodo Moeller wrote:

>> But you don't need a very long verify_data.  We also don't need 
>> very long record-layer MACs.  Both are needed only for real-time
>> authentication, which cannot be attacked after the fact. 

> This is true; but reasonable people seem to have different opinions 
> on what exactly is "sufficiently long". For example, RFC 4106 specifies
> three different choices for ICV (MAC) length (128/192/256 bits).

IPsec is a different setting since it is not based on streams (which
would be aborted in case of a decryption error).  However, this
reminds me to take DTLS into account, so yes, we possibly might need
long record-layer MACs (just for consistency for DTLS, not for actual
TLS security reasons).

Of course, the Finished message payload (verify_data) still will have
to be processed just once.  (An incorrect record-layer MAC is just a
reason to discard this particular packet in DTLS, but if the
record-layer MAC is correct and the verify_data isn't, then this
is a very bad sign, and the session should be canceled.)


> My suggestion was *not* to increase the current length, but rather 
> to add "agility" for this parameter as well (so that we don't
> need to revisit the TLS base spec if, e.g., some future cipher 
> suite wants to have all the pieces at 256-bit level).

OK, this makes perfect sense!  The question as cited here was,
should the verify_data length depend *on the PRF*.  It shouldn't;
but that doesn't mean we can't allow individual ciphersuites to
specify their preferred verify_data lengths.

Bodo


_______________________________________________
TLS mailing list
TLS@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/tls