Re: [TLS] WGLC for draft-ietf-tls-hybrid-design
Stephen Farrell <stephen.farrell@cs.tcd.ie> Sat, 30 April 2022 00:25 UTC
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id DC55DC15E6C1
for <tls@ietfa.amsl.com>; Fri, 29 Apr 2022 17:25:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.856
X-Spam-Level:
X-Spam-Status: No, score=-3.856 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, NICE_REPLY_A=-1.857, RCVD_IN_DNSWL_BLOCKED=0.001,
SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=cs.tcd.ie
Received: from mail.ietf.org ([50.223.129.194])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id IWreFHaucR2C for <tls@ietfa.amsl.com>;
Fri, 29 Apr 2022 17:25:12 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
(mail-db8eur05on2070f.outbound.protection.outlook.com
[IPv6:2a01:111:f400:7e1a::70f])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 80BB9C15E403
for <TLS@ietf.org>; Fri, 29 Apr 2022 17:25:11 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=Cv+P2TqtTIDFR+eYkN4NhpCelK38jV3bb60hdZkEa4aVkV0SamMn8viOpUfCQbHPk6UQyg5RewZjqhByktcLaAPdZO3QJOLMp6TEj6tsKp0PT83tU91TqfLoevJgS0JVETGVEY3Jv7blc2t/RWDhKZNDjdhWv51sTp+Y78/bYyfzt7DhhB6Lbzmflj18rPGjrlfYOvdBNz/q9H66JAMtvlUHGOUchI+O0vlKuY3fBD8paBhdTPlHj1i+Cp8InvA/hNB64skx5FjWwYsO5Sgx6njuWhylCuBWRQxZvLFW+k9B5Ko5E8MujBdM6hsCF7Q1euDzrmE5qNfheth5zuw2TQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=ZJMGA6LZXTcrYE6uyOnH5N+oUjTvzK4hirUxVENA050=;
b=Qb1T74cnOuNQt94RbK0V4529rnykNoNClBzdKrdd9CN3owHPyNtA5+R7QfheIAnxFDt7bLl02h4pOp4kLAotMl1A0ve5KAkWKQtdjbG3lztA6YqfzSMNYsx2ylKeKkMfFlTgqiW/vSyiYNna8Y7E+YU7ufGfjfS3HUPwRaLj6q0sNeWeK2HJhcqVmWE9m87qfuSOKPp+xQr2PUtE1tX69R7iL2ihuD59fJ34P/qP4XtDmnsWQofuazHUbJmFirxsZB0p/a/uui62OFD9kGEzwgsyEustIrl6ZKquL4b/I4+Mmv+zgl6ZmHVjoOBqfWXNu9Hu2AqDBJl9gNfHMTgkyQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=cs.tcd.ie; dmarc=pass action=none header.from=cs.tcd.ie;
dkim=pass header.d=cs.tcd.ie; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.tcd.ie; s=selector1;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=ZJMGA6LZXTcrYE6uyOnH5N+oUjTvzK4hirUxVENA050=;
b=tuk9eVBUCU+rG40pyM9AjcZfWqSO6yU0Sfe+NsgI0UUcPI5i4PiZr6N8xbfvWz/+EfzMIevDT8abkYcdoHB6q2AvfcpWgz10MfrAEY+mV/VDWOZZN8vmFW13o7W4Etuk2TetqT4FU9TrVJ+50c9dlJDhp+XTClwJIUyurp0gR6JDa2hikH/nu6hE+NCYj82hjs4wKgklxx/PuYg6Bq5IiMwECUzN0wvpvIpq8JTXYsEHr2AIeIlGhJqsRWyqJ7bA5jQbVYSRAzmHCTLl3mCqi5HNDF1+N84GT9X7ofjUPxgpOcNpLpcfB2SB8sUtRh4XkAE/n/WCkqoD2iWWRpAibQ==
Authentication-Results: dkim=none (message not signed)
header.d=none;dmarc=none action=none header.from=cs.tcd.ie;
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15)
by AM9PR02MB7484.eurprd02.prod.outlook.com (2603:10a6:20b:433::8) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Sat, 30 Apr
2022 00:25:00 +0000
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com
([fe80::a5a1:25f2:186c:f15c]) by DB7PR02MB5113.eurprd02.prod.outlook.com
([fe80::a5a1:25f2:186c:f15c%7]) with mapi id 15.20.5186.028; Sat, 30 Apr 2022
00:25:00 +0000
Message-ID: <e43fc649-3fc6-333b-c44d-55de0627c710@cs.tcd.ie>
Date: Sat, 30 Apr 2022 01:24:58 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
Thunderbird/91.8.1
Content-Language: en-US
To: "TLS@ietf.org" <TLS@ietf.org>
References: <27E9945C-6A0A-46DD-89F0-22BE59188216@heapingbits.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
In-Reply-To: <27E9945C-6A0A-46DD-89F0-22BE59188216@heapingbits.net>
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------KEyar4ob4qlBIDVymwZsv1pK"
X-ClientProxiedBy: DB8P191CA0004.EURP191.PROD.OUTLOOK.COM
(2603:10a6:10:130::14) To DB7PR02MB5113.eurprd02.prod.outlook.com
(2603:10a6:10:77::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ca5c50f1-4ace-422a-2dd8-08da2a3fdccf
X-MS-TrafficTypeDiagnostic: AM9PR02MB7484:EE_
X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True
X-Microsoft-Antispam-PRVS: <AM9PR02MB7484C2A29CB91E16FF5FD423A8FF9@AM9PR02MB7484.eurprd02.prod.outlook.com>
X-TCD-Routed-via-EOP: Routed via EOP
X-TCD-ROUTED: Passed-Transport-Routing-Rules
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM;
H:DB7PR02MB5113.eurprd02.prod.outlook.com; PTR:; CAT:NONE;
SFS:(13230001)(4636009)(366004)(53546011)(786003)(186003)(316002)(2616005)(33964004)(31696002)(83380400001)(86362001)(38100700002)(6512007)(21480400003)(5660300002)(6486002)(966005)(235185007)(508600001)(36756003)(31686004)(44832011)(6916009)(8936002)(66946007)(2906002)(8676002)(6506007)(66476007)(66556008)(45980500001)(43740500002);
DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 2
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TloxZWh2MEZpN0NlK0FleU5GZGpxNFhKRktPak9kU0Vpa2Zyam12VnZuY3lu?=
=?utf-8?B?S3ptZGkxdkJVajNZMVhTYjlOZHRRUFkxK3M4ZXdTYk9aYUh5UzY3dk9lTGNW?=
=?utf-8?B?UTZDQXFCUE9IaktMUy8vSXpEaXRkeFNrWGhYOUgxeVJoV1NSaDVnQ2M3elZr?=
=?utf-8?B?T2xneEE0a056bFJaNkNDbEFiTFBSSlBqTGN2cmhtRi8yMFAwOXlNMFJxRVRL?=
=?utf-8?B?ZERNTVdITTlhQ2Qwdmw0bk1JcVQyejhqSlVYbTJWNWVhcHpaQlljWE1TcGZI?=
=?utf-8?B?WUtiL3MzeFdIODNlc2FVTUJCNUcrUW9TdzQxWTkwakdoZG4vSEN1U0grZ2VR?=
=?utf-8?B?NE1JRmpGaEkwakFtSW1jYVozaEdtNWZIVWU2UWdvTUp1TDhLRHhrM0g4blI4?=
=?utf-8?B?NElwb2M1Qi9wYXR5WXpvUlIrSFUrOFUyRFo2Vk1pbXJoSlNybkdiYU8zSW82?=
=?utf-8?B?VTlVYWdyVE5rWkxXUWlLVlEyMWlOSzdHSDBhSW5RVHNJOUZ2TldKR3dkVjA5?=
=?utf-8?B?eXAydnR1MTNrUGlCaU1mMFNIZUZPMVBvQ3B5ZTMrRFlteEI1QkpOVGROdWEz?=
=?utf-8?B?OXRJTy9XUCtFYngwNTdidGU0SzdNWThFbGtjaXdQNU9MWVZ1V2NhMlB0bWx2?=
=?utf-8?B?YUw4Y0kxeVBKUkdvYTZHNlAyejAyL1FWUGpzL2JiU3RuTEhKRXBtU1ZjNHhi?=
=?utf-8?B?NkM0VHVsU3lLNDJ2ampMa3B0dW5nOGVBeHpKNGc3NEtFeU9uZytQeVVidUt6?=
=?utf-8?B?aklNU3V3RXJYa2N4cHRycXl3MGNvb25XU2JrT0YwUFJYd2NINWp0TENkUnFL?=
=?utf-8?B?TFF0N0RkZFRzdXcwRllsaCthZHBMZitPbGxFNHFXbkkzMzdqalRFRzRGZ2NP?=
=?utf-8?B?QXF2MnVJVVYrU3RNL0xVdW1IQWNjOW56NzRQSGFBMDVjVmhla0cxRzZBUS9S?=
=?utf-8?B?Vkh0akFOVlI5WEtmOU9TT2FWS3UwZ01Ua0VHWitscnA2SkdNMTNJcURuQXhp?=
=?utf-8?B?S0lsazR2TFVXUHRhdmFHZEpjeW51Qmc5bjB2d2V5WWJFRFJFSDJnWXdyaVlX?=
=?utf-8?B?NmQ1a2NMbXllRDVKZU85TjJqSUNlbmNORmZKRTROR0xEN3RyeEpzaUp4dkx3?=
=?utf-8?B?dmVIeFFaUnl1QlAzcVRIVHlzbW9RQVd6c0E4VWpwUDJkcndnWDFjL2FXb1gy?=
=?utf-8?B?U3N0ZjExR2ZuVytVNWVDeHMzQ09KYzYxVkVSRXl4ak55Vk52Y0djT3RDRUhw?=
=?utf-8?B?Rks0ZFJUa2I1TUN4ZWtWVUxLTVgvTklhRGltUERJNDVXTnZtU01WMFFUZEJq?=
=?utf-8?B?djgya3dTZ3RpdkhCWHZkTlp5ZEo0c0Y1b0FPQXJNTjVKOFlRdFA3TzlXOTF2?=
=?utf-8?B?dXl3NTRwOGxyYnJ4YVZFZ2hoQWdUbEpJL25JdUF1NUo5WUVGQlNnYWpXelFx?=
=?utf-8?B?d2pWcElYRHdCaGZrSHg1aURpQ21sU0VMc21iNkNIT3pXKzB4ZDltNVlsbVdB?=
=?utf-8?B?WHZnSUc1RUFjNFF3Niswa2NRNTBWSFV4Q21haXBwenZid1BHY1E3a1piTjVR?=
=?utf-8?B?dE5LOFl4UkR3ckY1Q2kxY2Z1QStxYjFaNGUwRmZ6Z1JuNS96dFJKS1RHTVZY?=
=?utf-8?B?VDNTT09pNElRR2s4N2w5UVg2WVN5WHpmUHRXaVdoVzh0cFZYdWtZOEFVeE1l?=
=?utf-8?B?OTg3UFpSUG9Xb1Bzc0hVbmxYZDFiNXZUQmRuVlJTdEU3eFk3aXNsc21FazFy?=
=?utf-8?B?RjRhb3hqYlJheHorNTFYeFVTRGxQWGJwWEdJZXlKSTBCbUpBNHZ3UHBNRlVG?=
=?utf-8?B?L0lxQUdQOGdTdUNVSmdDNGhTN21rTXNXUmkyMW1FVmVLZHB5MXcvVXFzUXdp?=
=?utf-8?B?WHZ2VGFRTmZ3eGpSVTJ5VWZtU0FheGh6SjcrL3Q1aUZ6VFRMOFdKbmNlUGtL?=
=?utf-8?B?NGRFNUsvcy9ScXJKek5taHlUN3hVUGpNZ0tCTFZqK0QxcFNhVUYrcGZOMUps?=
=?utf-8?B?cGRaaktFZlA5VXRlL0FxeTRpV1VLSU4rSnpGdGxDa0MzV2p2Q2ZDYmdaQmZx?=
=?utf-8?B?aVo5UHNnbGdxUFdjMytNYW1weFBYWGIyeXNuZHBnYUVvdTF3RC9KT3RRQVBQ?=
=?utf-8?B?SThoR1dXUUdFREhRSVR4c2F5RlE0TGZvU2JzbmY0d2x6U1VkbDUzd3FqeGZZ?=
=?utf-8?B?MXhCK3hLdUMzSmU5bFM2eTRQV3dBRHh4cFVxNm9ibkJmOVZ5djBmOXJaeVBj?=
=?utf-8?B?eUxrVDBJWlVMdG0raGg1SjV0RVJ0dmJBOEVwNFYrSlFvK1B0TC9HcG1KSWs1?=
=?utf-8?B?TXlTcloyM1lNZGlJYU5sRk1ZUzdWa3VpUmlNQ2dSUDhwRExMSGVKbmpZL1pZ?=
=?utf-8?Q?Q2E8ldkpmDaq6GCxC6FPB/f/oYl3baJNqKxHX96kVqfVD?=
X-MS-Exchange-AntiSpam-MessageData-1: 30DxsUpYRYiZnA==
X-OriginatorOrg: cs.tcd.ie
X-MS-Exchange-CrossTenant-Network-Message-Id: ca5c50f1-4ace-422a-2dd8-08da2a3fdccf
X-MS-Exchange-CrossTenant-AuthSource: DB7PR02MB5113.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Apr 2022 00:25:00.5655 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d595be8d-b306-45f4-8064-9e5b82fbe52b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qxi/x6NoCfTNM+zU1aaln0kvg64gTGrkw4oEYJWzEgTgloAyIUhDKelTwZ2os9E5
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR02MB7484
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/n9aXvKK8VFlhYGBhtxuldx3YbXA>
Subject: Re: [TLS] WGLC for draft-ietf-tls-hybrid-design
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working
group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>,
<mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>,
<mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Apr 2022 00:25:16 -0000
Hiya, On 27/04/2022 16:27, Christopher Wood wrote: > This email commences a two week WGLC for draft-ietf-tls-hybrid-design, located here: > > https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/ As I guess I've said before, I think progressing this draft now, even with this WGLC-then-park approach, is premature. However, I seem to be in the rough on that so can live with this ad-hoc process (teeth grinding mind you:-) so long as we park this for a sufficient period *and* are open to changing anything at the end of the parking-lot period. Even so, I think this is not yet ready for any such ad-hoc parking-lot: - section 1.5 implies a wish to reduce the number of octets sent - ECH creates a way to point from one part of the (encrypted, inner) ClientHello to another (the outer ClientHello). I don't think we want two such mechanisms, or one mechanism defined in ECH but none at all here, or even worse a second method. For me, that implies not "freezing" the structural work here 'till we see if ECH gets widespread deployment at which point we should consider re-use of the ECH mechanism. (Or maybe even consider both cases of re-using octets and invent another thing, but not 'till we see if ECH gets traction.) - section 2: if "classic" DH were broken, and we then depend on a PQ-KEM, doesn't that re-introduce all the problems seen with duplicating RSA private keys in middleboxes? If not, why not? If so, I don't recall that discussion in the WG (and we had many mega-threads on RSA as abused by MITM folks so there has to be stuff to be said;-) - similar to the above: if PQ KEM public values are like RSA public keys, how does the client know what value to use in the initial, basic 1-RTT ClientHello? (sorry if that's a dim question:-) If the answer is to use something like a ticket (for a 2nd connection) then that should be defined here I'd say, if it were to use yet another SVCB field that also ought be defined (or at least hinted at:-) - I'm also HRR-confused - if we don't yet know the details of the range of possible PQ KEM algs we want to allow here, how do we know that we almost always continue to avoid HRR in practice and thus benefit from a mixture of classic and PQ algs? (It's also a bit odd that HRR, much as I dislike it, doesn't get a mention here;-) I think the problem is that we don't want HRR to push a client back to only "classic" groups, if the client but not the server is worried about PQ stuff while both prioritise interop. - section 4: if this cannot support all NIST finalists due to length limits then we're again being premature esp. if NIST are supposed to be picking winners soon. We'd look pretty dim if we didn't support a NIST winner for this without saying why. - section 5: IMO all combined values here need to have recommended == "N" in IANA registries for a while and that needs to be in this draft before it even gets parked. Regardless of whether or not the WG agree with me on that, I think the current text is missing stuff in this section and don't recall the WG discussing that Nits etc below: - TLS1.1 and earlier mixed hash functions when deriving keys on the basis of then-suspected weaknesses in MD5, yet there were arguments made that that ad-hoc mixing wasn't useful, so we moved away from that in TLS1.2+. I don't see an argument or pointer in this draft to a justification that this (also seemingly ad-hoc?) catenation approach won't suffer analagous infelicity. Absent that, ISTM trying to finalise the structural parts of this now may be a cryptographically bad plan. (Even if in practice that's ok.) - 1.2: it's longer 2019 - one of the year or tense (of "include") should change, probably the former given the idea of parking this for some time - section 2: the tendency to document APIs (e.g. "KeyGen()") in protocol documents seems to me a bit of a double-edged sword - it should help some implementers but OTOH might mean we fail to consider how implementations with other internals might perform, so I'd prefer we are more clear as to how those APIs are optional, but that's really a matter of style I guess - section 2: HPKE is now RFC9180 Cheers, S.
- [TLS] WGLC for draft-ietf-tls-hybrid-design Christopher Wood
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Martin Thomson
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Nimrod Aviram
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design David Benjamin
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Nimrod Aviram
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Douglas Stebila
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Stephen Farrell
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Ilari Liusvaara
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Martin Thomson
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Stephen Farrell
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Russ Housley
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Ilari Liusvaara
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Salz, Rich
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Stephen Farrell
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Florence D
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Jonathan Hammell
- Re: [TLS] WGLC for draft-ietf-tls-hybrid-design Christopher Wood