[TLS] Re: [TLS]Consensus call for RFC8773bis Formal Analysis Requirement
Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de> Thu, 07 November 2024 21:13 UTC
Return-Path: <muhammad_usama.sardar@tu-dresden.de>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E9B5C1ECA84 for <tls@ietfa.amsl.com>; Thu, 7 Nov 2024 13:13:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=tu-dresden.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2JgLwBeLN8R1 for <tls@ietfa.amsl.com>; Thu, 7 Nov 2024 13:13:51 -0800 (PST)
Received: from mailout3.zih.tu-dresden.de (mailout3.zih.tu-dresden.de [141.30.67.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2E4CC1F7D7E for <tls@ietf.org>; Thu, 7 Nov 2024 13:13:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tu-dresden.de; s=dkim2022; h=In-Reply-To:From:CC:References:To:Subject: MIME-Version:Date:Message-ID:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=4jNgNJZBS7xTjZgBePMIrzVdMJWs0I9QpfXvTCGlVIE=; b=QY5QUzCkLEW2pRbKS11fId/wGw 4BM2trVPlg05/P2ytYDc4udEZLT6YFjDgi1uug3Zet0LsL8GcRnmHAec9d2yxq+k8rjNWDjqZzF/V U2FfAk3ShlyLnMK8t19pWoGYETCgQLolYqb70ntGNbTBjSXEyohbmUGQ3Nx8BjJtlHpuTobX7FBiu oyNfCfIIKecV23xOWmip9iwV7jPOv9w/cjIk2fcKXfeKNUlIkYHWxu9JbVZ05GYH3n/zZvk/TAVMS PKtx6Po81RwtuQt75rsWfoqVUHrJifAx+S+WqsZ7Tfg4Ah4352IVzFjZJLPrdzUmo0vXEur/yU54Y cp0jt7jw==;
Received: from [172.26.35.112] (helo=msx.tu-dresden.de) by mailout3.zih.tu-dresden.de with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <muhammad_usama.sardar@tu-dresden.de>) id 1t99p5-001xiR-Ob; Thu, 07 Nov 2024 22:13:48 +0100
Received: from msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) by MSX-T312.msx.ad.zih.tu-dresden.de (172.26.35.112) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Thu, 7 Nov 2024 22:13:43 +0100
Received: from [10.20.6.196] (89.101.156.233) by msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Thu, 7 Nov 2024 22:13:43 +0100
Content-Type: multipart/alternative; boundary="------------r2ubP3WeQRer6TfnJkE7L8C7"
Message-ID: <c1f05eb9-91dd-4e10-bd6e-e395f550362f@tu-dresden.de>
Date: Thu, 07 Nov 2024 21:13:42 +0000
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: tls@ietf.org
References: <CAOgPGoBxoEhVkzb=WYFvNEhN0sKLDLir0qPVSqx_a=Co7dkXgA@mail.gmail.com>
Content-Language: en-US
From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
In-Reply-To: <CAOgPGoBxoEhVkzb=WYFvNEhN0sKLDLir0qPVSqx_a=Co7dkXgA@mail.gmail.com>
X-ClientProxiedBy: MSX-L311.msx.ad.zih.tu-dresden.de (172.26.34.111) To msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139)
X-TUD-Virus-Scanned: mailout3.zih.tu-dresden.de
Message-ID-Hash: FSKS2E4EKFOTBCJF5D6X6A5752OAWAQI
X-Message-ID-Hash: FSKS2E4EKFOTBCJF5D6X6A5752OAWAQI
X-MailFrom: muhammad_usama.sardar@tu-dresden.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: [TLS]Consensus call for RFC8773bis Formal Analysis Requirement
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/euIlubnHu6eU-7hg2Qx0hxwQEz8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Dear chairs, I had a short meeting with Russ today and we don't understand /precisely/ what the FATT is worried about and therefore why a formal analysis is required at all. Extending CH and SH to negotiate external PSK follows the best current practice for extending TLS. Moreover, external PSK (shared out of band) instead of zero in the initial handshake can't make security worse. Even if external PSK is leaked, it's not worse than a known constant (zero). What could possibly go wrong? I don't see any liaison announced for this draft. So I don't know whom to ask for it. Could you please clarify with the FATT exactly which property from Appendix E.1 of RFC8446 it thinks might break with this draft? Thanks, Usama On 23.08.24 18:30, Joseph Salowey wrote: > In regard to moving RFC 8773 to standards track the formal analysis > triage group has provided input on the need for formal analysis which > was posted to the list [1]. The authors have published a revision of > the draft [2] to address some of this feedback, however the general > sentiment of the triage panel was that there should be some additional > symbolic analysis done to verify the security properties of the draft > and to verify there is no negative impact on TLS 1.3 security properties. > > The formal analysis is to verify the following properties of the > proposal in the draft: > > - The properties of the handshake defined in Appendix E.1 of RFC8446 > [3] remain intact if either the external PSK is not compromised or > (EC)DH is unbroken. > - The public key certificate authentication works as in TLS 1.3, and > this extension adds the condition that the party has possession of the > external PSK. The details of external PSK distribution are outside the > scope of this extension. > > This is a consensus call for the working group to determine how to > proceed between these two options: > > 1. Require formal analysis in the symbolic model to verify that the > proposal in the document does not negatively impact the security > properties of base TLS 1.3 and that the additional security properties > cited above are met > 2. Proceed with publishing the document without additional formal > verification > > Please respond to the list with a brief reason why you think the > document requires formal analysis or not. This call will end on > September 16, 2024. > > Thanks > > Joe, Deirdre, and Sean > > [1] https://mailarchive.ietf.org/arch/msg/tls/vK2N0vr83W6YlBQMIaVr9TeHzu4/ > [2] > https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-8773bis-00&url2=draft-ietf-tls-8773bis-02&difftype=--html > <https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-8773bis-00&url2=draft-ietf-tls-8773bis-02&difftype=--html> > [3] https://www.rfc-editor.org/rfc/rfc8446.html#appendix-E.1 > > _______________________________________________ > TLS mailing list --tls@ietf.org > To unsubscribe send an email totls-leave@ietf.org
- [TLS]Consensus call for RFC8773bis Formal Analysi… Joseph Salowey
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Ben Smyth
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Eric Rescorla
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Bob Beck
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Deirdre Connolly
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Deirdre Connolly
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Deirdre Connolly
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Muhammad Usama Sardar
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Stephen Farrell
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Christopher Patton
- [TLS] FATT Process Joseph Salowey
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Eric Rescorla
- [TLS] Re: FATT Process Stephen Farrell
- [TLS] Re: FATT Process Joseph Salowey
- [TLS] Re: FATT Process Salz, Rich
- [TLS] Re: FATT Process Stephen Farrell
- [TLS] Re: FATT Process Watson Ladd
- [TLS] Re: FATT Process Salz, Rich
- [TLS]Re: Consensus call for RFC8773bis Formal Ana… Salz, Rich
- [TLS] Re: Consensus call for RFC8773bis Formal An… Joseph Salowey
- [TLS] Re: Consensus call for RFC8773bis Formal An… Russ Housley
- [TLS] Re: Consensus call for RFC8773bis Formal An… Eric Rescorla
- [TLS] Re: Consensus call for RFC8773bis Formal An… John Mattsson
- [TLS] Re: Consensus call for RFC8773bis Formal An… John Mattsson
- [TLS] Re: [TLS]Consensus call for RFC8773bis Form… Muhammad Usama Sardar