Re: [TLS] Deprecating more (DSA?) (was Re: Deprecating RC4 (was: draft-ietf-tls-encrypt-then-mac))

Hanno Böck <hanno@hboeck.de> Tue, 15 April 2014 19:03 UTC

Return-Path: <hanno@hboeck.de>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2BFB1A055D for <tls@ietfa.amsl.com>; Tue, 15 Apr 2014 12:03:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level:
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MANGLED_BACK=2.3, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XhU_VHxd2anR for <tls@ietfa.amsl.com>; Tue, 15 Apr 2014 12:03:30 -0700 (PDT)
Received: from zucker.schokokeks.org (zucker.schokokeks.org [178.63.68.96]) by ietfa.amsl.com (Postfix) with ESMTP id AE0611A0642 for <tls@ietf.org>; Tue, 15 Apr 2014 12:03:29 -0700 (PDT)
Received: from localhost (91-66-81-2-dynip.superkabel.de [::ffff:91.66.81.2]) (AUTH: LOGIN hanno-default@schokokeks.org, TLS: TLSv1/SSLv3, 128bits, AES128-GCM-SHA256) by zucker.schokokeks.org with ESMTPSA; Tue, 15 Apr 2014 21:03:18 +0200 id 0000000000020004.00000000534D8278.000041F8
Date: Tue, 15 Apr 2014 21:02:55 +0200
From: Hanno Böck <hanno@hboeck.de>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Message-ID: <20140415210255.62e9fc65@hboeck.de>
In-Reply-To: <534D772F.5020908@fifthhorseman.net>
References: <CABcZeBOvxL7Zws0UNowViBWGaVBgfm3zXt8=dNPKffGfN3q2gA@mail.gmail.com> <20140415153435.7f82b3a0@hboeck.de> <500CA3F0-86D2-4C60-8762-4481C1400479@gmail.com> <20140415160327.7dd88945@hboeck.de> <534D772F.5020908@fifthhorseman.net>
X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.23; x86_64-pc-linux-gnu)
Mime-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="=_zucker.schokokeks.org-16888-1397588606-0001-2"
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/kKAU0d0SGoKvWqL657x361rxWn8
Cc: tls@ietf.org
Subject: Re: [TLS] Deprecating more (DSA?) (was Re: Deprecating RC4 (was: draft-ietf-tls-encrypt-then-mac))
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Apr 2014 19:03:35 -0000

On Tue, 15 Apr 2014 14:15:11 -0400
Daniel Kahn Gillmor <dkg@fifthhorseman.net> wrote:

> On 04/15/2014 10:03 AM, Hanno Böck wrote:
> > My opinion on that is that we should have multiple lines of defense.
> > Sure, if the RNG is bad we should fix it. But we all know good RNGs
> > is a nontrivial problem. So while fixing RNGs is a priority, we
> > also should have algorithms that don't completely break so badly
> > that they spit out the public key if the RNG fails.
> 
> https://tools.ietf.org/html/rfc6979 suggests a way to use DSA that
> doesn't break as catastrophically if the RNG fails.

Interesting, didn't know that.

But basically, the whole discussion about DSA's security is missing the
point. It's probably possible to implement DSA in a secure way. But
what I really want to achieve is getting TLS simpler.
I think there's wide agreement that DSA if done correctly has a
security comparable to RSA. However, in TLS everyone uses RSA, nobody
uses DSA.
And I think unused code is dangerous. Because nobody cares, nobody
tests it, nobody looks at it but it still can bite you when it comes to
security. That I think is a lesson we should've learned from
Heartbleed. And therefore I think we should identify unused parts of
the TLS spec and deprecate it.

-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@hboeck.de
GPG: BBB51E42