[TLS] Re: [EXTERNAL] draft-ietf-tls-key-share-prediction next steps
Bas Westerbaan <bas@cloudflare.com> Tue, 10 September 2024 22:06 UTC
Return-Path: <bas@cloudflare.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CBECC18DB82 for <tls@ietfa.amsl.com>; Tue, 10 Sep 2024 15:06:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cloudflare.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G9SKhAYVT70N for <tls@ietfa.amsl.com>; Tue, 10 Sep 2024 15:06:04 -0700 (PDT)
Received: from mail-yb1-xb35.google.com (mail-yb1-xb35.google.com [IPv6:2607:f8b0:4864:20::b35]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3B42C1840FE for <tls@ietf.org>; Tue, 10 Sep 2024 15:06:04 -0700 (PDT)
Received: by mail-yb1-xb35.google.com with SMTP id 3f1490d57ef6-e04196b7603so5919822276.0 for <tls@ietf.org>; Tue, 10 Sep 2024 15:06:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google09082023; t=1726005963; x=1726610763; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=gCmqUyKRuWjTaqkerYGsJoAkeb7DMbYxmCNcPZ+tEBo=; b=KswdjLEsXpAnLwZIm+UUWMx+hgfaRqg8axhiS/6Gv/VJLHxcjfCOcIHlVeohx81y7U plF/0fYVsRvjdz3pGyKN+2WjQMFoM+udzyddXlUivRRaJ5ClmWiwGcUjo26KsekLHpj5 sKGjgsYjrhbdN3PIWSFguxT/ptGTspoKVDak4df3bjItBJxPasEzGk4GqAQXh2QDsxGV 3Emo1fiiJjzcWLAUKKxiQuB1ccqVcXSPT0qOvAXx85xrGxvPh0C6U4MJJkgM1PLVDhG5 tFLAnkBIUgEkLn0zLAI9SX1LjMjiK9u8Mk3i8HedsFrQmYrb4UlWJjt9IyXfN1ta1S8+ vcuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1726005963; x=1726610763; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=gCmqUyKRuWjTaqkerYGsJoAkeb7DMbYxmCNcPZ+tEBo=; b=McNWAL4G5AGQKG6j/Cv2Dyo/1gYQCAVD3Ja/xzRxulFrm1HOM+6IBn/QN+MfcIaR6e 6R/hbFqQhd/uzNW17pTTv1twME0W5di2noZ9jaWn76RwIqam9U5X7Sya6wykOFf/WSTf A87nNEtlCtQFokLF+bC9ZvZcHJMoQH3MacNPw+BLvrqizMzoEZ8COIdm1zYbt04M2HFe Bevi8jeu1KUvRw5uZiAangy2e1LHzNjuV3CN3jLBA9GBbmAsLWbOupbUfBVQDHvhH1SE p4agFBXZSc5tmTaYETTXAueqvNgyiAA3Xp+vXrXvck3+Exqf8E26uYBAXr9MYXBR5nMQ Ll4g==
X-Forwarded-Encrypted: i=1; AJvYcCWi+LJuvDkV2VWv/i51CWCOxUTS0wssUQlGi9XEK9Tw5HYbiadzZpJOLRzjXDbr2viwKmw=@ietf.org
X-Gm-Message-State: AOJu0Yx+CHmVzz7eJDri8TmAvrudgmrMBKmIvxOx8bKIJJh7bPhHsDtU UROjwYeTFUAyImeidJuLMDeGFsGkGE37R6RhTdfcVYdMPzPxH0hfP/yrEy6P/udZt/a7bsewuKa Oe6677deRbkHQ4bok2dVeL0wQQV4+aS2BDG4ycg==
X-Google-Smtp-Source: AGHT+IFE3vOoNZL+G/F+Wy07WpBdqq6y8YRV1oUexPtsQBJ5eNzpy5DT9IiqkAxsPx16HDzZZFPSj9bbAGIJcD66haI=
X-Received: by 2002:a05:6902:1022:b0:e11:7869:9fd with SMTP id 3f1490d57ef6-e1d348661b5mr14549459276.7.1726005963017; Tue, 10 Sep 2024 15:06:03 -0700 (PDT)
MIME-Version: 1.0
References: <CAF8qwaAU+cRapAc3xnySXiq2nOTXAFvLQYdWNC6rXdFj8iA39w@mail.gmail.com> <DS7PR21MB37163D5C728E7917A939E30D8C9A2@DS7PR21MB3716.namprd21.prod.outlook.com>
In-Reply-To: <DS7PR21MB37163D5C728E7917A939E30D8C9A2@DS7PR21MB3716.namprd21.prod.outlook.com>
From: Bas Westerbaan <bas@cloudflare.com>
Date: Wed, 11 Sep 2024 00:05:51 +0200
Message-ID: <CAMjbhoXj55Lmz_n2fUHjO76zHcrXeo2ca=Y98To+scZhybv9Dw@mail.gmail.com>
To: Andrei Popov <Andrei.Popov=40microsoft.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004ec1650621cb1457"
Message-ID-Hash: DKIYK5QIIRUBLW67E3CKNR2PHVMWOEQV
X-Message-ID-Hash: DKIYK5QIIRUBLW67E3CKNR2PHVMWOEQV
X-MailFrom: bas@cloudflare.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "<tls@ietf.org>" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS] Re: [EXTERNAL] draft-ietf-tls-key-share-prediction next steps
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/_sS6zQ6r2An5T3LgXvRaKxCByu8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Same. On Tue, Sep 10, 2024 at 11:51 PM Andrei Popov <Andrei.Popov= 40microsoft.com@dmarc.ietf.org> wrote: > I support staying the course, continuing work on the key share prediction > draft and allocating the code point. > > > > Cheers, > > > > Andrei > > > > *From:* David Benjamin <davidben@chromium.org> > *Sent:* Tuesday, September 10, 2024 2:40 PM > *To:* <tls@ietf.org> <tls@ietf.org> > *Subject:* [EXTERNAL] [TLS] draft-ietf-tls-key-share-prediction next steps > > > > Hi all, > > > > Now that we're working through the Kyber to ML-KEM transition, TLS 1.3's > awkwardness around key share prediction is becoming starkly visible. (It is > difficult for clients to efficiently offer both Kyber and ML-KEM, but a > hard transition loses PQ coverage for some clients. Kyber was a draft > standard, just deployed by early adopters, so while not ideal, I think the > hard transition is not the end of the world. ML-KEM is expected to be > durable, so a coverage-interrupting transition to FancyNewKEM *would* be > a problem.) > > > > We adopted draft-ietf-tls-key-share-prediction in June to address this. > There hasn't been a whole lot to do on it since. I've cut a new draft, > draft-ietf-tls-key-share-prediction-01, with some very minor changes that > were queued up in GitHub. I'd like to sort out next steps and move forward. > > > > Beyond that, there are a couple of minor issues in the issue tracker. I > don't believe either of these need to block getting a codepoint. > > https://github.com/tlswg/tls-key-share-prediction/issues/4 - unless > folks think otherwise, I plan to just leave this alone and close this > > https://github.com/tlswg/tls-key-share-prediction/issues/7 - unless folks > think otherwise, I plan to just leave this alone and not require the > receiver to check > > > > Finally, there's the question of downgrade protection: > > https://github.com/tlswg/tls-key-share-prediction/issues/11 > > > > For some background if folks have forgotten, the original key share > prediction draft included a ton of complexity to accommodate existing > server behavior that would preferentially pick groups out of key_share even > if an otherwise more preferred group was in supported_groups. Depending on > what the server was trying to do there, this could be perfectly fine (if > the server believes the groups are comparable in security) or a downgrade > risk (if the server actually believed they were in different security > classes---PQ vs classical---but implemented a key_share-first selection > algorithm anyway). Pre-adoption, my original draft took the position that > it was ambiguous and we cannot safely assume the server knew what it was > doing. It designed a scheme to clarify the semantics going forward and use > codepoints to ratchet in whether the server implemented the new semantics. > > > https://www.ietf.org/archive/id/draft-davidben-tls-key-share-prediction-00.html > > > > After WG discussion, I think we broadly concluded the semantics were > actually already present in RFC 8446, and it was not worth the trouble to > second-guess the servers here. That led to the much simpler draft, which > simply discusses why this is OK in security considerations: > > > https://www.ietf.org/archive/id/draft-ietf-tls-key-share-prediction-01.html#name-security-considerations > > > > As I wrote that text, I unsurprisingly agree with and am fine with this > outcome. :-) But there was some chatter about it in the adoption thread > (see GitHub link), so I filed the issue so we continued to discuss it. I > think perhaps now is the time to discuss it, if we're going to. Do folks > want to discuss it? Are there alternate proposals, or should we just stay > the course? Unless we have an alternate proposal, I propose we just stay > the course and go with [what I understand the conclusion to be from] the > previous WG discussion. > > > > If there are no further significant changes that folks want to make, I > would like to propose we get a codepoint for this and unblock > implementation. The earlier this is ready, the more likely that we will be > prepared by the time the next KEM transition happens. > > > > Thoughts? > > > > David > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org >
- [TLS] draft-ietf-tls-key-share-prediction next st… David Benjamin
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… John Mattsson
- [TLS] Re: [EXTERNAL] draft-ietf-tls-key-share-pre… Andrei Popov
- [TLS] Re: [EXTERNAL] draft-ietf-tls-key-share-pre… Bas Westerbaan
- [TLS] Re: [EXTERNAL] draft-ietf-tls-key-share-pre… Bob Beck
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… Loganaden Velvindron
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… Ilari Liusvaara
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… David Benjamin
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… David Benjamin
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… Kampanakis, Panos
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… David Adrian
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… Kampanakis, Panos
- [TLS] Re: draft-ietf-tls-key-share-prediction nex… Eric Rescorla