Re: [TLS] Results of interim meeting

"Blumenthal, Uri - 0558 - MITLL" <uri@ll.mit.edu> Tue, 27 May 2014 13:48 UTC

Return-Path: <prvs=022488b634=uri@ll.mit.edu>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E04881A0153 for <tls@ietfa.amsl.com>; Tue, 27 May 2014 06:48:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.848
X-Spam-Level:
X-Spam-Status: No, score=-4.848 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i3BR2bhAy8XI for <tls@ietfa.amsl.com>; Tue, 27 May 2014 06:48:45 -0700 (PDT)
Received: from mx2.ll.mit.edu (MX2.LL.MIT.EDU [129.55.12.46]) by ietfa.amsl.com (Postfix) with ESMTP id 24FFE1A0137 for <tls@ietf.org>; Tue, 27 May 2014 06:48:44 -0700 (PDT)
Received: from LLE2K10-HUB02.mitll.ad.local (LLE2K10-HUB02.mitll.ad.local) by mx2.ll.mit.edu (unknown) with ESMTP id s4RDmRKP017691 for <tls@ietf.org>; Tue, 27 May 2014 09:48:41 -0400
From: "Blumenthal, Uri - 0558 - MITLL" <uri@ll.mit.edu>
To: "tls@ietf.org" <tls@ietf.org>
Thread-Topic: [TLS] Results of interim meeting
Thread-Index: AQHPeQBlyWKsiTpCKEixNr5jRMe1MZtThaOAgAAQN4CAABQGgIAAyLkA
Date: Tue, 27 May 2014 13:48:21 +0000
Message-ID: <CFAA0F16.15C3F%uri@ll.mit.edu>
References: <CACsn0cmHwo6E2tGZu64q0RxTdzvxGgh8Jonzj4rr1zZxehswLg@mail.gmail.com> <53839895.5000508@mit.edu> <CACsn0cnp2cCSVY5S9DB3BZxUCFckjmnq0eMfb+XyvFPdWyoFxg@mail.gmail.com> <CABcZeBNZy+cqN-+9058TS_hLfECJ0V2tKmJe_OHeN2oq86HTWg@mail.gmail.com>
In-Reply-To: <CABcZeBNZy+cqN-+9058TS_hLfECJ0V2tKmJe_OHeN2oq86HTWg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.1.140326
x-originating-ip: [172.25.177.85]
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="B_3484028892_75811"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.11.96, 1.0.14, 0.0.0000 definitions=2014-05-27_02:2014-05-26,2014-05-27,1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1402240000 definitions=main-1405270193
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/mnpEEX_gE_tDvZv2zarUfflMT9A
Subject: Re: [TLS] Results of interim meeting
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 May 2014 13:48:49 -0000

> Specifically, in current TLS, the MS [0] and subsequently the
> session keys [1] are computed as a PRF of the PMS/MS and
> random values, specifically:
> 
>   master_secret = PRF(pre_master_secret, "master secret",
>                            ClientHello.random + ServerHello.random)
>        [0..47];
> 
> As the triple handshake paper observes, this allows an attacker
> to force two handshakes to produce the same MS by duplicating
> the PMS and the randoms. The current proposal is to replace the
> random values with a hash of the handshake transcript, i.e.,
> 
>  master_secret = PRF(pre_master_secret, "extended master secret",
>                        session_hash)
>                        [0..47];
Why not 

master_secret = PRF(pre_master_secret, "extended master secret",
                          Hash(ClientHello.random + ServerHello.random +
session_hash)) [0..47];