Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

Stephen Farrell <stephen.farrell@cs.tcd.ie> Sat, 30 April 2022 00:25 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC55DC15E6C1 for <tls@ietfa.amsl.com>; Fri, 29 Apr 2022 17:25:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.856
X-Spam-Level:
X-Spam-Status: No, score=-3.856 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-1.857, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IWreFHaucR2C for <tls@ietfa.amsl.com>; Fri, 29 Apr 2022 17:25:12 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2070f.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::70f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80BB9C15E403 for <TLS@ietf.org>; Fri, 29 Apr 2022 17:25:11 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Cv+P2TqtTIDFR+eYkN4NhpCelK38jV3bb60hdZkEa4aVkV0SamMn8viOpUfCQbHPk6UQyg5RewZjqhByktcLaAPdZO3QJOLMp6TEj6tsKp0PT83tU91TqfLoevJgS0JVETGVEY3Jv7blc2t/RWDhKZNDjdhWv51sTp+Y78/bYyfzt7DhhB6Lbzmflj18rPGjrlfYOvdBNz/q9H66JAMtvlUHGOUchI+O0vlKuY3fBD8paBhdTPlHj1i+Cp8InvA/hNB64skx5FjWwYsO5Sgx6njuWhylCuBWRQxZvLFW+k9B5Ko5E8MujBdM6hsCF7Q1euDzrmE5qNfheth5zuw2TQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZJMGA6LZXTcrYE6uyOnH5N+oUjTvzK4hirUxVENA050=; b=Qb1T74cnOuNQt94RbK0V4529rnykNoNClBzdKrdd9CN3owHPyNtA5+R7QfheIAnxFDt7bLl02h4pOp4kLAotMl1A0ve5KAkWKQtdjbG3lztA6YqfzSMNYsx2ylKeKkMfFlTgqiW/vSyiYNna8Y7E+YU7ufGfjfS3HUPwRaLj6q0sNeWeK2HJhcqVmWE9m87qfuSOKPp+xQr2PUtE1tX69R7iL2ihuD59fJ34P/qP4XtDmnsWQofuazHUbJmFirxsZB0p/a/uui62OFD9kGEzwgsyEustIrl6ZKquL4b/I4+Mmv+zgl6ZmHVjoOBqfWXNu9Hu2AqDBJl9gNfHMTgkyQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.tcd.ie; dmarc=pass action=none header.from=cs.tcd.ie; dkim=pass header.d=cs.tcd.ie; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.tcd.ie; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZJMGA6LZXTcrYE6uyOnH5N+oUjTvzK4hirUxVENA050=; b=tuk9eVBUCU+rG40pyM9AjcZfWqSO6yU0Sfe+NsgI0UUcPI5i4PiZr6N8xbfvWz/+EfzMIevDT8abkYcdoHB6q2AvfcpWgz10MfrAEY+mV/VDWOZZN8vmFW13o7W4Etuk2TetqT4FU9TrVJ+50c9dlJDhp+XTClwJIUyurp0gR6JDa2hikH/nu6hE+NCYj82hjs4wKgklxx/PuYg6Bq5IiMwECUzN0wvpvIpq8JTXYsEHr2AIeIlGhJqsRWyqJ7bA5jQbVYSRAzmHCTLl3mCqi5HNDF1+N84GT9X7ofjUPxgpOcNpLpcfB2SB8sUtRh4XkAE/n/WCkqoD2iWWRpAibQ==
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cs.tcd.ie;
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15) by AM9PR02MB7484.eurprd02.prod.outlook.com (2603:10a6:20b:433::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.14; Sat, 30 Apr 2022 00:25:00 +0000
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::a5a1:25f2:186c:f15c]) by DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::a5a1:25f2:186c:f15c%7]) with mapi id 15.20.5186.028; Sat, 30 Apr 2022 00:25:00 +0000
Message-ID: <e43fc649-3fc6-333b-c44d-55de0627c710@cs.tcd.ie>
Date: Sat, 30 Apr 2022 01:24:58 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.8.1
Content-Language: en-US
To: "TLS@ietf.org" <TLS@ietf.org>
References: <27E9945C-6A0A-46DD-89F0-22BE59188216@heapingbits.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
In-Reply-To: <27E9945C-6A0A-46DD-89F0-22BE59188216@heapingbits.net>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------KEyar4ob4qlBIDVymwZsv1pK"
X-ClientProxiedBy: DB8P191CA0004.EURP191.PROD.OUTLOOK.COM (2603:10a6:10:130::14) To DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ca5c50f1-4ace-422a-2dd8-08da2a3fdccf
X-MS-TrafficTypeDiagnostic: AM9PR02MB7484:EE_
X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True
X-Microsoft-Antispam-PRVS: <AM9PR02MB7484C2A29CB91E16FF5FD423A8FF9@AM9PR02MB7484.eurprd02.prod.outlook.com>
X-TCD-Routed-via-EOP: Routed via EOP
X-TCD-ROUTED: Passed-Transport-Routing-Rules
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR02MB5113.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(53546011)(786003)(186003)(316002)(2616005)(33964004)(31696002)(83380400001)(86362001)(38100700002)(6512007)(21480400003)(5660300002)(6486002)(966005)(235185007)(508600001)(36756003)(31686004)(44832011)(6916009)(8936002)(66946007)(2906002)(8676002)(6506007)(66476007)(66556008)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 2
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TloxZWh2MEZpN0NlK0FleU5GZGpxNFhKRktPak9kU0Vpa2Zyam12VnZuY3lu?= =?utf-8?B?S3ptZGkxdkJVajNZMVhTYjlOZHRRUFkxK3M4ZXdTYk9aYUh5UzY3dk9lTGNW?= =?utf-8?B?UTZDQXFCUE9IaktMUy8vSXpEaXRkeFNrWGhYOUgxeVJoV1NSaDVnQ2M3elZr?= =?utf-8?B?T2xneEE0a056bFJaNkNDbEFiTFBSSlBqTGN2cmhtRi8yMFAwOXlNMFJxRVRL?= =?utf-8?B?ZERNTVdITTlhQ2Qwdmw0bk1JcVQyejhqSlVYbTJWNWVhcHpaQlljWE1TcGZI?= =?utf-8?B?WUtiL3MzeFdIODNlc2FVTUJCNUcrUW9TdzQxWTkwakdoZG4vSEN1U0grZ2VR?= =?utf-8?B?NE1JRmpGaEkwakFtSW1jYVozaEdtNWZIVWU2UWdvTUp1TDhLRHhrM0g4blI4?= =?utf-8?B?NElwb2M1Qi9wYXR5WXpvUlIrSFUrOFUyRFo2Vk1pbXJoSlNybkdiYU8zSW82?= =?utf-8?B?VTlVYWdyVE5rWkxXUWlLVlEyMWlOSzdHSDBhSW5RVHNJOUZ2TldKR3dkVjA5?= =?utf-8?B?eXAydnR1MTNrUGlCaU1mMFNIZUZPMVBvQ3B5ZTMrRFlteEI1QkpOVGROdWEz?= =?utf-8?B?OXRJTy9XUCtFYngwNTdidGU0SzdNWThFbGtjaXdQNU9MWVZ1V2NhMlB0bWx2?= =?utf-8?B?YUw4Y0kxeVBKUkdvYTZHNlAyejAyL1FWUGpzL2JiU3RuTEhKRXBtU1ZjNHhi?= =?utf-8?B?NkM0VHVsU3lLNDJ2ampMa3B0dW5nOGVBeHpKNGc3NEtFeU9uZytQeVVidUt6?= =?utf-8?B?aklNU3V3RXJYa2N4cHRycXl3MGNvb25XU2JrT0YwUFJYd2NINWp0TENkUnFL?= =?utf-8?B?TFF0N0RkZFRzdXcwRllsaCthZHBMZitPbGxFNHFXbkkzMzdqalRFRzRGZ2NP?= =?utf-8?B?QXF2MnVJVVYrU3RNL0xVdW1IQWNjOW56NzRQSGFBMDVjVmhla0cxRzZBUS9S?= =?utf-8?B?Vkh0akFOVlI5WEtmOU9TT2FWS3UwZ01Ua0VHWitscnA2SkdNMTNJcURuQXhp?= =?utf-8?B?S0lsazR2TFVXUHRhdmFHZEpjeW51Qmc5bjB2d2V5WWJFRFJFSDJnWXdyaVlX?= =?utf-8?B?NmQ1a2NMbXllRDVKZU85TjJqSUNlbmNORmZKRTROR0xEN3RyeEpzaUp4dkx3?= =?utf-8?B?dmVIeFFaUnl1QlAzcVRIVHlzbW9RQVd6c0E4VWpwUDJkcndnWDFjL2FXb1gy?= =?utf-8?B?U3N0ZjExR2ZuVytVNWVDeHMzQ09KYzYxVkVSRXl4ak55Vk52Y0djT3RDRUhw?= =?utf-8?B?Rks0ZFJUa2I1TUN4ZWtWVUxLTVgvTklhRGltUERJNDVXTnZtU01WMFFUZEJq?= =?utf-8?B?djgya3dTZ3RpdkhCWHZkTlp5ZEo0c0Y1b0FPQXJNTjVKOFlRdFA3TzlXOTF2?= =?utf-8?B?dXl3NTRwOGxyYnJ4YVZFZ2hoQWdUbEpJL25JdUF1NUo5WUVGQlNnYWpXelFx?= =?utf-8?B?d2pWcElYRHdCaGZrSHg1aURpQ21sU0VMc21iNkNIT3pXKzB4ZDltNVlsbVdB?= =?utf-8?B?WHZnSUc1RUFjNFF3Niswa2NRNTBWSFV4Q21haXBwenZid1BHY1E3a1piTjVR?= =?utf-8?B?dE5LOFl4UkR3ckY1Q2kxY2Z1QStxYjFaNGUwRmZ6Z1JuNS96dFJKS1RHTVZY?= =?utf-8?B?VDNTT09pNElRR2s4N2w5UVg2WVN5WHpmUHRXaVdoVzh0cFZYdWtZOEFVeE1l?= =?utf-8?B?OTg3UFpSUG9Xb1Bzc0hVbmxYZDFiNXZUQmRuVlJTdEU3eFk3aXNsc21FazFy?= =?utf-8?B?RjRhb3hqYlJheHorNTFYeFVTRGxQWGJwWEdJZXlKSTBCbUpBNHZ3UHBNRlVG?= =?utf-8?B?L0lxQUdQOGdTdUNVSmdDNGhTN21rTXNXUmkyMW1FVmVLZHB5MXcvVXFzUXdp?= =?utf-8?B?WHZ2VGFRTmZ3eGpSVTJ5VWZtU0FheGh6SjcrL3Q1aUZ6VFRMOFdKbmNlUGtL?= =?utf-8?B?NGRFNUsvcy9ScXJKek5taHlUN3hVUGpNZ0tCTFZqK0QxcFNhVUYrcGZOMUps?= =?utf-8?B?cGRaaktFZlA5VXRlL0FxeTRpV1VLSU4rSnpGdGxDa0MzV2p2Q2ZDYmdaQmZx?= =?utf-8?B?aVo5UHNnbGdxUFdjMytNYW1weFBYWGIyeXNuZHBnYUVvdTF3RC9KT3RRQVBQ?= =?utf-8?B?SThoR1dXUUdFREhRSVR4c2F5RlE0TGZvU2JzbmY0d2x6U1VkbDUzd3FqeGZZ?= =?utf-8?B?MXhCK3hLdUMzSmU5bFM2eTRQV3dBRHh4cFVxNm9ibkJmOVZ5djBmOXJaeVBj?= =?utf-8?B?eUxrVDBJWlVMdG0raGg1SjV0RVJ0dmJBOEVwNFYrSlFvK1B0TC9HcG1KSWs1?= =?utf-8?B?TXlTcloyM1lNZGlJYU5sRk1ZUzdWa3VpUmlNQ2dSUDhwRExMSGVKbmpZL1pZ?= =?utf-8?Q?Q2E8ldkpmDaq6GCxC6FPB/f/oYl3baJNqKxHX96kVqfVD?=
X-MS-Exchange-AntiSpam-MessageData-1: 30DxsUpYRYiZnA==
X-OriginatorOrg: cs.tcd.ie
X-MS-Exchange-CrossTenant-Network-Message-Id: ca5c50f1-4ace-422a-2dd8-08da2a3fdccf
X-MS-Exchange-CrossTenant-AuthSource: DB7PR02MB5113.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Apr 2022 00:25:00.5655 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d595be8d-b306-45f4-8064-9e5b82fbe52b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qxi/x6NoCfTNM+zU1aaln0kvg64gTGrkw4oEYJWzEgTgloAyIUhDKelTwZ2os9E5
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR02MB7484
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/n9aXvKK8VFlhYGBhtxuldx3YbXA>
Subject: Re: [TLS] WGLC for draft-ietf-tls-hybrid-design
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Apr 2022 00:25:16 -0000

Hiya,

On 27/04/2022 16:27, Christopher Wood wrote:
> This email commences a two week WGLC for draft-ietf-tls-hybrid-design, located here:
> 
>     https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/

As I guess I've said before, I think progressing this draft
now, even with this WGLC-then-park approach, is premature.

However, I seem to be in the rough on that so can live with
this ad-hoc process (teeth grinding mind you:-) so long as we
park this for a sufficient period *and* are open to changing
anything at the end of the parking-lot period.

Even so, I think this is not yet ready for any such ad-hoc
parking-lot:

- section 1.5 implies a wish to reduce the number of
octets sent - ECH creates a way to point from one part
of the (encrypted, inner) ClientHello to another (the
outer ClientHello). I don't think we want two such
mechanisms, or one mechanism defined in ECH but none at
all here, or even worse a second method. For me, that
implies not "freezing" the structural work here 'till
we see if ECH gets widespread deployment at which point
we should consider re-use of the ECH mechanism. (Or maybe
even consider both cases of re-using octets and invent
another thing, but not 'till we see if ECH gets traction.)

- section 2: if "classic" DH were broken, and we then
depend on a PQ-KEM, doesn't that re-introduce all the
problems seen with duplicating RSA private keys in
middleboxes? If not, why not? If so, I don't recall
that discussion in the WG (and we had many mega-threads
on RSA as abused by MITM folks so there has to be stuff
to be said;-)

- similar to the above: if PQ KEM public values are
like RSA public keys, how does the client know what
value to use in the initial, basic 1-RTT ClientHello?
(sorry if that's a dim question:-) If the answer is
to use something like a ticket (for a 2nd connection)
then that should be defined here I'd say, if it were
to use yet another SVCB field that also ought be
defined (or at least hinted at:-)

- I'm also HRR-confused - if we don't yet know the
details of the range of possible PQ KEM algs we want to
allow here, how do we know that we almost always continue
to avoid HRR in practice and thus benefit from a mixture of
classic and PQ algs? (It's also a bit odd that HRR,
much as I dislike it, doesn't get a mention here;-) I
think the problem is that we don't want HRR to push a
client back to only "classic" groups, if the client but
not the server is worried about PQ stuff while both
prioritise interop.

- section 4: if this cannot support all NIST finalists
due to length limits then we're again being premature
esp. if NIST are supposed to be picking winners soon.
We'd look pretty dim if we didn't support a NIST winner
for this without saying why.

- section 5: IMO all combined values here need to have
recommended == "N" in IANA registries for a while and
that needs to be in this draft before it even gets
parked. Regardless of whether or not the WG agree with
me on that, I think the current text is missing stuff
in this section and don't recall the WG discussing that

Nits etc below:

- TLS1.1 and earlier mixed hash functions when deriving
keys on the basis of then-suspected weaknesses in MD5, yet
there were arguments made that that ad-hoc mixing wasn't
useful, so we moved away from that in TLS1.2+. I don't
see an argument or pointer in this draft to a justification
that this (also seemingly ad-hoc?) catenation approach
won't suffer analagous infelicity. Absent that, ISTM trying
to finalise the structural parts of this now may be a
cryptographically bad plan. (Even if in practice that's ok.)

- 1.2: it's longer 2019 - one of the year or tense (of
"include") should change, probably the former given the
idea of parking this for some time

- section 2: the tendency to document APIs (e.g. "KeyGen()")
in protocol documents seems to me a bit of a double-edged
sword - it should help some implementers but OTOH might
mean we fail to consider how implementations with other
internals might perform, so I'd prefer we are more clear
as to how those APIs are optional, but that's really a
matter of style I guess

- section 2: HPKE is now RFC9180

Cheers,
S.