Re: [TLS] Unifying tickets and sessions

"Richard Fussenegger, BSc" <richard@fussenegger.info> Tue, 21 October 2014 07:10 UTC

Return-Path: <richard@fussenegger.info>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14EF41AD06E for <tls@ietfa.amsl.com>; Tue, 21 Oct 2014 00:10:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.3
X-Spam-Level:
X-Spam-Status: No, score=-1.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_15=0.6] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2fGvqCA7Pke9 for <tls@ietfa.amsl.com>; Tue, 21 Oct 2014 00:10:52 -0700 (PDT)
Received: from mx207.easyname.com (mx207.easyname.com [212.232.25.163]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFA2C1AD09A for <tls@ietf.org>; Tue, 21 Oct 2014 00:10:51 -0700 (PDT)
Received: from 89-26-76-175.goll.dyn.salzburg-online.at ([89.26.76.175] helo=[192.168.0.11]) by mx.easyname.eu with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <richard@fussenegger.info>) id 1XgTah-0008Rr-NO for tls@ietf.org; Tue, 21 Oct 2014 09:10:49 +0200
Message-ID: <544606E5.2070807@fussenegger.info>
Date: Tue, 21 Oct 2014 09:10:29 +0200
From: "Richard Fussenegger, BSc" <richard@fussenegger.info>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: tls@ietf.org
References: <2A0EFB9C05D0164E98F19BB0AF3708C71D3A8C48AF@USMBX1.msg.corp.akamai.com> <5445775E.3050108@fussenegger.info> <54458113.1050304@polarssl.org> <20141020235832.GK19158@mournblade.imrryr.org>
In-Reply-To: <20141020235832.GK19158@mournblade.imrryr.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms000706070900010307060308"
X-ACL-Warn: X-DNSBL-v4bl
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/fjv9TP7avHo9EcpCvdJDqKJ2GeE
Subject: Re: [TLS] Unifying tickets and sessions
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Oct 2014 07:10:54 -0000

I was to vague in regards to implementation, sorry. Of course we only 
want a single key or rather one long blob of random data to manage. The 
idea of using a key length of at least the 'highest supported 
ciphers'[*] sounds very good to me and would honor the ciphers in use. 
By always using a 128 bit key (current OpenSSL implementation) higher 
ciphers are essentially downgraded.

[*] Better would be 'from all ciphers in use' otherwise one ends up with 
a (insert ridiculous high value here) bit key while only using 128 bit 
ciphers in the configuration. Dropping the key if a new stronger 
configuration is loaded seems like a good idea to me at this point. I'm 
looking at this from a performance perspective and glimpsing over to the 
fact that the cryptography community agrees that 128 bit security will 
be enough for the next 10 to 20 years.[2] I really can't tell if this 
would be problematic from an implementation point of view. I think that 
single hosts won't have a problem here and I guess that it wouldn't be 
for clusters as well. The cluster configuration should be in sync but it 
could become a problem if one node has a differing configuration (for 
whatever reason). What opinion/insights do you have on this?

Regards
Richard

[1] http://www.keylength.com/

On 10/21/2014 1:58 AM, Viktor Dukhovni wrote:
> On Mon, Oct 20, 2014 at 11:39:31PM +0200, Manuel P?gouri?-Gonnard wrote:
>
>>> The RFC should clarify that the negotiated cipher **MUST** be honored
>>> when encrypting the state that will be sent to the client. [1]
> I am having trouble parsing the original suggestion above.
>
>> While I'm sympathetic with the goal, I'm afraid that will complicate
>> implementations more than necessary. How about requiring to use a key length at
>> least a high as the highest supported ciphersuite instead?
> Does it mean (as I think you're saying) that session tickets MUST
> be encrypted with the session's negotiated ciphersuite?  That seems
> rather unmanageable.  A single sufficiently strong key is likely
> far more realistic.
>
> With keys for clusters of servers rotated by code external to the
> TLS library, asking for a key for every algorith/size is impractical.
>