Re: [TLS] What's it called

2021-06-24 Thread Tim Bray
How much data is too much?

On Thu, Jun 24, 2021 at 12:02 PM Paterson Kenneth <
kenny.pater...@inf.ethz.ch> wrote:

> Hi Rich,
>
>
>
> We speak of reaching data limits, and the process of changing the key has
> many names, e.g. key rotation, key renewal, key refreshing, key updating.
>
>
>
> Any of those ring a bell?
>
>
>
> Cheers
>
>
>
> Kenny
>
>
>
>
>
> *From: *TLS  on behalf of "Salz, Rich"  40akamai@dmarc.ietf.org>
> *Date: *Thursday, 24 June 2021 at 19:32
> *To: *"tls@ietf.org" 
> *Subject: *[TLS] What's it called
>
>
>
> I’m blanking on a term and web searches turn up too much useless info.
>
>
>
> What is it called when we have to start using a new symmetric key because
> we’ve encrypted too much data with the old one?  Key exhaustion fits, but
> probably isn’t it.
>
>
>
>
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS]Re: Kicking off the TLS 1.3 formal analysis triage panel

2024-06-01 Thread Tim Bray
 Is anyone from AWS active on the WG?  When I left AWS a few years back,
they had a very active group entirely dedicated to this kind of work, and
any version of TLS is obviously relevant to AWS. Might be worth reaching
out to them.

On Jun 1, 2024 at 1:32:20 PM, Eric Rescorla  wrote:

> Thanks for posting this.
>
> It's great to see the triage panel coming together. This is very
> thorough and helpful.
>
> My take-home from this report is that the security properties of
> 8773-bis are not immediately obvious and therefore that prior to
> advancing it we should actually have some sort of more formal analysis
> using a tool like Tamarin/Proverif, etc.
>
>
> I did want to address one point from Russ's response:
>
> > Who will perform this analysis?  I asked a researcher to perform
> > such an analysis, and the response was that it is too simple to get
> > a paper.  Now waht?
>
> Fundamentally, the IETF is a volunteer organization and it's up to
> the WG members who are interested in a document to bring it any time
> we have a requirement for a document to advance, the authors and the
> WG need to find a way to fulfill it. This is true both for subjective
> requirements (i.e., document has to be of high quality) and objective
> ones. For example, RFC 6410 requires
>
>There are at least two independent interoperating implementations
>with widespread deployment and successful operational experience.
>
> The IETF doesn't have a mechanism for producing these implementations;
> that's the responsibility of the WG and the community at large, and
> if there is insufficient interest to produced these implementations,
> then the specification doesn't advance. I would note that the
> TLS WG has already held some documents from advancing to PS
> until there was sufficient implementation experience, so it's not
> just about 6410.
>
> Similarly here, if the WG feels that a change is sufficiently large to
> require formal analysis then the WG -- and more specifically those who
> want the work to move forward -- need to figure out how to get that
> analysis done, though of course the triage panel or the broader
> community might help facilitate if there is enough demand or interest
> in the work.
>
>
>
> Some more detailed thoughts on the panel review below.
>
> I did have one question about the format of the report. I see a
> lot of "I statements". I assume these are (potentially) different
> people's comments aggregated together, not all the same person?
> I know it's more work but it might be more helpful if future reports
> were structured in a slightly more narrative fashion.
>
>
> Here is a summary across all participants:
>
> > On changes made by the 8773bis draft to TLS 1.3 and on the draft
> > itself:
> >
> > The draft adds an extension to negotiate a handshake using both a PSK
> > and certificates for authentication. The draft makes specific claims
> > around PQ confidentiality if the PSK is secret and forward secrecy
> > when the PSK is destroyed. The claims the draft makes around
> > authentication based on the PSK aren't clear to me on the first
> > reading and would likely need some refinement prior to analysis.
>
> I think this is the heart of the question: should I be inferring
> anything about the counterparty's identity based on them knowing
> the PSK and if so, what?
>
>
> > I found the RFC unclear on how the extension should be used in
> > subsequent sessions. They wrote: "Since the "tls_cert_with_extern_psk"
> > extension is intended to be used only with initial handshakes,…”. So
> > let’s say you use the extension in a first session with an external
> > PSK + cert. Must the PSK generated from that session ticket be used in
> > subsequent sessions with their extension , i.e. cert + psk, or can it
> > go back to “normal mode”, i.e. psk only without cert? I’m not sure how
> > this behaves specially w.r.t. to their goal of being safe against
> > CRQC.
>
> My sense is that because the resumed keys are all derived from the
> original PSK, that they would also be CRQC-resistant.
>
>
> With that said, I don't understand how resumption is supposed to work
> in practice S 5.1 says.
>
> > The "pre_shared_key" extension is defined in Section 4.2.11 of
> > [RFC8446]. The syntax is repeated below for convenience. All of the
> > listed PSKs MUST be external PSKs. If a resumption PSK is listed along
> > with the "tls_cert_with_extern_psk" extension, the server MUST abort
> > the handshake with an "illegal_parameter" alert.
>
> One of the basic assumptions of TLS 1.3 is that the server can choose
> whether to resume or not and the handshake completes either way.
> However, this restriction makes that impossible because the client
> must offer *either* the external or resumption PSK. If it offers
> the external PSK resumption is not possible and if it offers the
> resumption PSK and the server is not willing to resume then
> the external PSK is not used.
>
> -Ekr
>
>
>
>
>
>
> On Mon, May 20, 2024 at 3:06 PM Dei

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread Tim Bray
 I’m not a TLS insider but I’ve been watching this discussion, and…

On Aug 3, 2024 at 9:36:16 AM, hannes.tschofenig=40gmx@dmarc.ietf.org
wrote:

> Hence, this is not a mechanism that allows a third party in the middle of
> the network communication to somehow decrypt traffic. It is a tool for a
> developer and must be enabled by the developer on one of the involved end
> points to work.
>

If this is correct (some previous emails made me think it might not be) I
think it would be a good idea for a strong consensus statement to this
effect to appear in the WG product.  Because if it is perceived that the
IETF is providing and blessing MITM mechanisms, that will be… um,
controversial.

PS: I wonder what “in the middle of the network means”, exactly.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Fwd: New Version Notification for draft-farrell-tls-pqg-00.txt

2024-12-15 Thread Tim Bray
 Perhaps useful: I’m a customer of cryptography but not a cryptographer. I
have learned a tremendous amount about the open issues and state of play by
reading this discourse.  Someone could blog it, and that kind of blog tends
to get on YComb and be widely read. But I think it would be of great help
to the community of crypto customers like me if a document starting with
something like Stephen’s draft could be expanded a bit to outline the state
of play, including the interesting lack of consensus among experts and
across the intel community, and published.-T
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Changing WG Mail List Reputation

2025-01-15 Thread Tim Bray
On Jan 15, 2025 at 11:37:58 AM, Quynh Dang  wrote:

Defining a minimum percentage of votes to have  the consensus would take
> care of the problem and the chairs at the IETF would love that.
>

No it wouldn’t and no we (speaking as former co-chair of two WGs) wouldn’t.

I’m not sure why we’re relitigating the works-pretty-OK process of
consensus calls from the chair and potential appeals.

 -T
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org