Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Daniel Kahn Gillmor
On Tue 2016-03-29 21:53:13 -0400, Sean Turner wrote: > 1. The IANA registry rules for the TLS cipher suite registry [1] will be > changed to specification required. > > 2. A new “IETF Recommended” column will be added with two values: “Y” or “N”. > Y and N have the following meaning: > > Cipher

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Yoav Nir
Hi Sean I also strongly support this. I’m just wondering how we plan to enforce the "stable, publicly available, peer reviewed reference” part. As your examples below show, the reference tends to be an I-D. That’s stable and publicly available, but we have no idea if it’s peer reviewed or who

Re: [TLS] Resumption and Forward Secrecy, 0-RTT and Safety

2016-03-29 Thread Tony Arcieri
On Mon, Mar 28, 2016 at 3:49 PM, Ryan Hamilton wrote: > ​We (Chrome) definitely want this (sending cookies in 0-RTT requests), and > are doing this today with QUIC (which we can't wait to TLS 1.3-ify). ​ > I went to RealWorldCrypto 2016 and saw the TLS track and all of the analysis TLS 1.3 has r

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Ilari Liusvaara
On Wed, Mar 30, 2016 at 12:52:23PM +1100, Martin Thomson wrote: > On 30 March 2016 at 12:49, Colm MacCárthaigh wrote: > > But isn't that too late? If you have to wait for the client finished message > > before you can even decrypt the 0RTT section; what's the benefit? it's not > > "0RTT" any more.

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
在 16-3-30 下午12:17, "Peter Bowen" 写入: >It doesn't seem to be clearly spelled out: is the "charging GW" a >system that can read data passing between the client and server but >cannot modify it? If so, do I have it right that you are trying to >design an extension that allows the client to send a

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Salz, Rich
Strongly support this. ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
Hi, Martin: We are following the progress of that work. But in principle, any extension to TLS should be done in this group, that is why we raised the discussion in the TLS list. ^_^ Cheers Dacheng 在 16-3-30 下午12:17, "Martin Thomson" 写入: >On 30 March 2016 at 15:12, Dacheng Zhang >wrote: >> T

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 15:12, Dacheng Zhang wrote: > The charging GW will not authenticate the client, it only needs to be > informed how the following traffics will be charged, in a trusted way. We've seen this request before. It's not an easy question to answer. In short, you want to make infor

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Peter Bowen
It doesn't seem to be clearly spelled out: is the "charging GW" a system that can read data passing between the client and server but cannot modify it? If so, do I have it right that you are trying to design an extension that allows the client to send a message that can be observed but not tampere

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
The charging GW will not authenticate the client, it only needs to be informed how the following traffics will be charged, in a trusted way. That is why we will do this work. For secure reasons, we intend to use TLS to secure the traffics to or from our APP. So, we need to provide such information

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
Right. When we design this solution, we assume it will work with TLS1.3. The TLS WG has stopped working on the extensions for TLS 1.2, right? 发件人: Eric Rescorla 日期: 2016年3月30日 星期三 上午11:59 至: Martin Thomson 抄送: dacheng de , tls 主题: Re: [TLS] 回复: A TLS extension transfering service indicatio

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 15:04, Dacheng Zhang wrote: > Dacheng:Let assume we trust the device. But the APP use a SNI to indicate > the service that the APP intends to access. Because the SNI is static which > may not be changed for months, it is easier for attackers who monitor the > network to get the

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
Hi, Erk: My reply inline please. Cheers Dacheng 发件人: Eric Rescorla 日期: 2016年3月30日 星期三 上午11:19 至: dacheng de 抄送: Eric Mill , Dave Garrett , tls 主题: Re: [TLS] 回复: A TLS extension transfering service indication information On Tue, Mar 29, 2016 at 6:42 PM, Dacheng Zhang wrote: > Hi, Ekr

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 14:59, Eric Rescorla wrote: > I meant "would work with TLS 1.3". I don't believe it will work with TLS 1.2 > even > with EMS because (even with the MAC) the SI extension is bound to the > ClientHello > which is replayable in 1.2 because it contains public information, with the

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Eric Rescorla
I meant "would work with TLS 1.3". I don't believe it will work with TLS 1.2 even with EMS because (even with the MAC) the SI extension is bound to the ClientHello which is replayable in 1.2 because it contains public information, with the only non-fixed information being the random. However in 1.3

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 14:19, Eric Rescorla wrote: > That wouldn't work with TLS 1.2 but would work with TLS 1.2. I think that you meant that it would work with TLS 1.2 and extended master secret, or TLS 1.3. ___ TLS mailing list TLS@ietf.org https://www.

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 14:18, Colm MacCárthaigh wrote: > though I'll note that it relies on basically a Mac-Then-Encrypt > construction. I don't think that the right term to apply here. This isn't record protection. The MAC authenticates the handshake here, then we use AEAD for record protection a

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Eric Rescorla
On Tue, Mar 29, 2016 at 6:42 PM, Dacheng Zhang wrote: > Hi, Ekr: > > Thanks for reviewing the draft and the comments. Please see my reply > inline please. > > 发件人: Eric Rescorla > 日期: 2016年3月30日 星期三 上午7:21 > 至: dacheng de > 抄送: Eric Mill , Dave Garrett , > tls > 主题: Re: [TLS] 回复: A TLS extensi

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Colm MacCárthaigh
On Tue, Mar 29, 2016 at 6:52 PM, Martin Thomson wrote: > On 30 March 2016 at 12:49, Colm MacCárthaigh wrote: > > But isn't that too late? If you have to wait for the client finished > message > > before you can even decrypt the 0RTT section; what's the benefit? it's > not > > "0RTT" any more. >

[TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Sean Turner
Hi! In Yokohama, we discussed changing the IANA registry assignment rules for cipher suites to allow anyone with a stable, publicly available, peer reviewed reference document to request and get a code point and to add an “IETF Recommended” column to the registry. This change is motivated by t

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 12:49, Colm MacCárthaigh wrote: > But isn't that too late? If you have to wait for the client finished message > before you can even decrypt the 0RTT section; what's the benefit? it's not > "0RTT" any more. There is a Finished message in the client's first flight. It's before

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Colm MacCárthaigh
On Tue, Mar 29, 2016 at 6:25 PM, Martin Thomson wrote: > On 30 March 2016 at 11:30, Colm MacCárthaigh wrote: > > * How is the elapsed time on the wire authenticated? can't an attacker > > modify it and replay? > > It is authenticated by virtue of being part of the session transcript. > It will b

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 12:45, Kyle Nekritz wrote: > The time since the client hello was sent/received can still be used if it is > stored after opening the connection. Only if we introduce an inconsistency by asking for different handling in different circumstances. I agree that in many cases, New

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Kyle Nekritz
> Unfortunately, there is no client message that solicits the NewSessionTicket. > The message can be sent spontaneously by a server at any time. The time since the client hello was sent/received can still be used if it is stored after opening the connection. It's also important exactly where a

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
Hi, Ekr: Thanks for reviewing the draft and the comments. Please see my reply inline please. 发件人: Eric Rescorla 日期: 2016年3月30日 星期三 上午7:21 至: dacheng de 抄送: Eric Mill , Dave Garrett , tls 主题: Re: [TLS] 回复: A TLS extension transfering service indication information I have taken an initial

Re: [TLS] Tickets and cross protocol attacks

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 05:00, David Benjamin wrote: > On the server, OpenSSL already includes the version in the SSL_SESSION > structure, and recent enough versions of it will not accept sessions at the > wrong version NSS too. This is the right thing, I think. I have no objection to making this

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Martin Thomson
On 30 March 2016 at 11:30, Colm MacCárthaigh wrote: > * How is the elapsed time on the wire authenticated? can't an attacker > modify it and replay? It is authenticated by virtue of being part of the session transcript. It will be authenticated by the Finished message included by the client, by t

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Colm MacCárthaigh
On Tue, Mar 29, 2016 at 4:37 PM, Martin Thomson wrote: > On 30 March 2016 at 06:53, Colm MacCárthaigh wrote: > > It's likely I'm misunderstanding, but I'll ask to clear it up. Does this > > proposal imply that a 0RTT section can only be sent within a very tight > time > > limit of when the serve

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Martin Thomson
On 29 March 2016 at 22:32, Stephen Farrell wrote: > In an offlist exchange with Martin, I suggested allowing > finer granularity than 1s, e.g. 1ms. I think that this is reasonable. This might allow for tighter tolerance for drift, which means less replay opportunity. On 30 March 2016 at 04:45,

Re: [TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Eric Rescorla
I have taken an initial look at this document, but I find myself confused about the security model. Specifically, you say that you can't use SNI because customers will lie and insert the SNI for service A in the ClientHello when going to service B. However, I don't see how this token stops that, s

[TLS] Key separation and privacy

2016-03-29 Thread Björn Tackmann
Dear TLS Working Group, this message relates mostly to (real-world) privacy, so I'd be particularly grateful for comments from people concerned with that. The TRON workshop [1] re-initiated a discussion about the handling of keys among cryptography researchers involved with TLS. Although there

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Colm MacCárthaigh
On Tue, Mar 29, 2016 at 3:29 AM, Martin Thomson wrote: > https://github.com/tlswg/tls13-spec/pull/437 > > In short, have the client report the time since it received the > configuration. Then have the server reject early data if the time > doesn't match. > > I think that this is a relatively eas

Re: [TLS] Call for consensus: Removing DHE-based 0-RTT

2016-03-29 Thread Ilari Liusvaara
On Tue, Mar 29, 2016 at 09:13:57AM -0700, Bill Cox wrote: > As most people on this list know, stateful PSK 0-RTT can be more secure > than any scheme possible with DHE 0-RTT, stateful or not. I disagree with this. Both PSK and DHE can with server-side state archive best possible security (relat

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Ilari Liusvaara
On Tue, Mar 29, 2016 at 09:29:10PM +1100, Martin Thomson wrote: > https://github.com/tlswg/tls13-spec/pull/437 > > In short, have the client report the time since it received the > configuration. Then have the server reject early data if the time > doesn't match. > > I think that this is a relat

Re: [TLS] Call for consensus: Removing DHE-based 0-RTT

2016-03-29 Thread Eric Rescorla
On Tue, Mar 29, 2016 at 10:14 AM, Wan-Teh Chang wrote: > On Tue, Mar 29, 2016 at 6:11 AM, Sean Turner wrote: > > > > There also seems to be (rougher) consensus not to support 0-RTT via DHE > > (i.e., semi-static DHE) in TLS 1.3 at this time leaving the only 0-RTT > mode > > as PSK. The security

Re: [TLS] Tickets and cross protocol attacks

2016-03-29 Thread David Benjamin
On Tue, Mar 29, 2016 at 12:57 PM Subodh Iyengar wrote: > Recent attacks like SLOTH, DROWN, PCKS1.5 padding oracles have shown that > attacks on previous version of TLS can be used to attack new version of > TLS. > > One thing that is not mandated by TLS 1.3 is separation of session tickets > and

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Kyle Nekritz
I think this will better account for the round trip delay if the elapsed_time is defined on the client as the time since the request for the session ticket (in other words, the time since the client hello was sent). That way both the server computed time and the client reported time will include

Re: [TLS] Call for consensus: Removing DHE-based 0-RTT

2016-03-29 Thread Wan-Teh Chang
On Tue, Mar 29, 2016 at 6:11 AM, Sean Turner wrote: > > There also seems to be (rougher) consensus not to support 0-RTT via DHE > (i.e., semi-static DHE) in TLS 1.3 at this time leaving the only 0-RTT mode > as PSK. The security properties of PSK-based 0-RTT and DHE-based 0-RTT > are almost identi

[TLS] Tickets and cross protocol attacks

2016-03-29 Thread Subodh Iyengar
Recent attacks like SLOTH, DROWN, PCKS1.5 padding oracles have shown that attacks on previous version of TLS can be used to attack new version of TLS. One thing that is not mandated by TLS 1.3 is separation of session tickets and session ids between TLS protocols. For example a client could use

Re: [TLS] Publishing draft-ietf-tls-56-bit-ciphersuites as Historic

2016-03-29 Thread Yoav Nir
On 29 Mar 2016, at 5:42 PM, Hubert Kario wrote: > On Tuesday 29 March 2016 15:09:16 Yoav Nir wrote: >>> On 29 Mar 2016, at 2:15 PM, Hubert Kario wrote: >>> >>> On Friday 25 March 2016 22:07:02 Yoav Nir wrote: > On 25 Mar 2016, at 8:16 PM, Yuhong Bao > wrote: > > I wonder if i

Re: [TLS] Publishing draft-ietf-tls-56-bit-ciphersuites as Historic

2016-03-29 Thread Hubert Kario
On Tuesday 29 March 2016 15:09:16 Yoav Nir wrote: > > On 29 Mar 2016, at 2:15 PM, Hubert Kario wrote: > > > > On Friday 25 March 2016 22:07:02 Yoav Nir wrote: > >>> On 25 Mar 2016, at 8:16 PM, Yuhong Bao > >>> wrote: > >>> > >>> I wonder if it would be possible to publish > >>> draft-ietf-tls-5

[TLS] Call for consensus: Removing DHE-based 0-RTT

2016-03-29 Thread Sean Turner
All, To make sure we’ve got a clear way forward coming out of our BA sessions, we need to make sure there’s consensus on a couple of outstanding issues. So... There also seems to be (rougher) consensus not to support 0-RTT via DHE (i.e., semi-static DHE) in TLS 1.3 at this time leaving the on

[TLS] Call for consensus: Removing 0-RTT client auth

2016-03-29 Thread Sean Turner
All, To make sure we’ve got a clear way forward coming out of our BA sessions, we need to make sure there’s consensus on a couple of outstanding issues. So... It seems that there is a clear consensus not to support 0-RTT client authentication in TLS 1.3 at this time. If you think 0-RTT client

Re: [TLS] Publishing draft-ietf-tls-56-bit-ciphersuites as Historic

2016-03-29 Thread Yoav Nir
> On 29 Mar 2016, at 2:15 PM, Hubert Kario wrote: > > On Friday 25 March 2016 22:07:02 Yoav Nir wrote: >>> On 25 Mar 2016, at 8:16 PM, Yuhong Bao >>> wrote: >>> >>> I wonder if it would be possible to publish >>> draft-ietf-tls-56-bit-ciphersuites as Historic (in the sense of RFC >>> 6101). It

Re: [TLS] Diffie-Hellman: value of Z - the shared secret - without leading zero octets

2016-03-29 Thread Peter Gutmann
Bill Cox writes: >I spent 2 weeks last year tracking down a flaky bug that only occurs once in >every 256 connection: the leading 0 byte was no longer being stripped in a >code change I ported from OpenSSL master, and only Maria DB ran random tests >enough to trigger this condition. My self-test

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Stephen Farrell
On 29/03/16 11:29, Martin Thomson wrote: > https://github.com/tlswg/tls13-spec/pull/437 > > In short, have the client report the time since it received the > configuration. Then have the server reject early data if the time > doesn't match. > > I think that this is a relatively easy change to

Re: [TLS] Publishing draft-ietf-tls-56-bit-ciphersuites as Historic

2016-03-29 Thread Hubert Kario
On Friday 25 March 2016 22:07:02 Yoav Nir wrote: > > On 25 Mar 2016, at 8:16 PM, Yuhong Bao > > wrote: > > > > I wonder if it would be possible to publish > > draft-ietf-tls-56-bit-ciphersuites as Historic (in the sense of RFC > > 6101). It would start with > > https://tools.ietf.org/html/draft-i

[TLS] Narrowing the replay window

2016-03-29 Thread Martin Thomson
https://github.com/tlswg/tls13-spec/pull/437 In short, have the client report the time since it received the configuration. Then have the server reject early data if the time doesn't match. I think that this is a relatively easy change to make. Now, your exposure to replay is much less. It's n

Re: [TLS] Resumption and Forward Secrecy, 0-RTT and Safety

2016-03-29 Thread Martin Thomson
On 29 March 2016 at 19:21, Karthikeyan Bhargavan wrote: > Note that choosing the expiry/rollover period also determines the replay > window, I think that we can fix that one easily, as I suggested in an earlier mail. I plan to open a PR that does that. __

Re: [TLS] Resumption and Forward Secrecy, 0-RTT and Safety

2016-03-29 Thread Karthikeyan Bhargavan
> ​We (Chrome) definitely want this (sending cookies in 0-RTT requests), and > are doing this today with QUIC (which we can't wait to TLS 1.3-ify). ​ I see. So, it is quite likely that the most common usage of TLS 1.3 would send sensitive data in 0-RTT. It is unfortunate that the forward secrec

[TLS] 回复: A TLS extension transfering service indication information

2016-03-29 Thread Dacheng Zhang
Hi, Actually, we refer to the extension as a 'SNI' extension. In this extension, SI(service indication) information is provided. In the next version, we will use 'SI extension' to take place of 'SNI extension'. ^_^ Cheers Dacheng___ TLS mailing list TLS