Re: [TLS] WGLC: draft-ietf-tls-session-hash

Adam Langley <> Mon, 24 November 2014 10:36 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 386781A1EEF for <>; Mon, 24 Nov 2014 02:36:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.278
X-Spam-Status: No, score=-1.278 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id KeyV8ArZiDEJ for <>; Mon, 24 Nov 2014 02:36:24 -0800 (PST)
Received: from ( [IPv6:2a00:1450:4010:c04::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id C7AEC1A1EFC for <>; Mon, 24 Nov 2014 02:36:23 -0800 (PST)
Received: by with SMTP id l4so1530830lbv.39 for <>; Mon, 24 Nov 2014 02:36:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type:content-transfer-encoding; bh=12LTfRv94HTGhKzBAHxE2G+L0ZRVarLwlbq3jm5HEXI=; b=KtGVMwjC30omwHzjquUjaaUBuSqvBOL9i19ZdsBhEC4KfUtVdxytDSffzwfWdLMS1I vseXCWWDNJrrZ5gyHehiJOT+rhSRdt5T7s0dU/QkjN4Zn2DEOxr9i8qIEWxVBJiK/m4y xwdvdlO4xU5ZEWDe+tTmsEPTJuNv50JCTvvi15dx1ZKPdDcmKev4iRNdCpD5ycCxUV7W azuZ9aXcGxvAFQpVQdI0YsZaKY+CJ2nrSar7E8YTJuiKzdIl58h4XxDy4/JO/vBMzs0h UqjtGaX6vN/HXKRT8TulA4xW+Ld61PDrB1bTHX5YHdcxpJdYXzyg9EIiPOi+f8XyQ+mM iV1Q==
MIME-Version: 1.0
X-Received: by with SMTP id ei5mr19752015lad.75.1416825382279; Mon, 24 Nov 2014 02:36:22 -0800 (PST)
Received: by with HTTP; Mon, 24 Nov 2014 02:36:22 -0800 (PST)
In-Reply-To: <>
References: <> <>
Date: Mon, 24 Nov 2014 02:36:22 -0800
X-Google-Sender-Auth: DJXrF-LJa98MRNx-3j_vbCjzATs
Message-ID: <>
From: Adam Langley <>
To: Yoav Nir <>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Cc: " (" <>
Subject: Re: [TLS] WGLC: draft-ietf-tls-session-hash
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 24 Nov 2014 10:36:25 -0000

On Mon, Nov 24, 2014 at 12:44 AM, Yoav Nir <> wrote:
> The first sentence says that (EC)DHE ciphersuites are also vulnerable with explicit params. The last sentence talks of "other key exchanges", which in practice means DHE or ECDHE with named groups or curves. But that lower case “may” is content-free. Suppose a new server supports only ECDHE ciphersuites with named curves (there are some popular web sites that do this today), does it also need the session hash extension? This is not covered in either the introduction or the security considerations.

I think that last sentence was roughly aimed to mean: "other key
exchanges (i.e. SRP, Kerberos, PSK), and future ones, may also have
properties that allow for this attack. We're not going to worry about
analysing them and instead will solve the problem in general (we

But clearly some work tweaking is called for as that's evidently not
completely clear.

> Second issue: The draft does not say whether a server should include the extension in a resumed session. The extension has no effect (as section 5.1 says), but it should be specified one way or the other. I would go for the less meaningless bytes option.

Sure, let's say that the server SHOULD NOT echo it. (And I'll make a
note to check my implementations for that.)

> Third issue: Why can’t an attacker disable this protection by simply omitting the extension from both its ClientHello and ServerHello?

Writing this down might be called for too. In practice, I'm
implementing it so that calls to get tls-unique values and the like
will fail on resumed connections where the original session did not
use this extension.