Re: [TLS] Key Schedule (PRs #453, #454).

2016-05-19 Thread Ilari Liusvaara
On Thu, May 19, 2016 at 02:38:35PM -0700, Eric Rescorla wrote: > On Thu, May 19, 2016 at 12:35 PM, Ilari Liusvaara > wrote: > > > > In very quick'n'dirty security analysis the other thing I noticed was > > that if server handshake needs something to be nonce w.r.t. "SS", (e.g. > > happens in GDHE-

Re: [TLS] Key Schedule (PRs #453, #454).

2016-05-19 Thread Eric Rescorla
Sorry, I think you lost me there. Can you rephrase? -Ekr On Thu, May 19, 2016 at 12:35 PM, Ilari Liusvaara wrote: > On Thu, May 19, 2016 at 12:13:45PM -0700, Eric Rescorla wrote: > > On Thu, May 19, 2016 at 12:11 PM, Ilari Liusvaara < > ilariliusva...@welho.com> > > wrote: > > > > > On Thu, Ma

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Kyle Rose
I've modified the branch to use your wording. As Viktor said, it doesn't address his objection, but it's still a more precise starting point for further discussion. Kyle On Thu, May 19, 2016 at 4:37 PM, Martin Thomson wrote: > On 19 May 2016 at 16:01, Viktor Dukhovni wrote: >> Nevertheless, som

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Viktor Dukhovni
On Thu, May 19, 2016 at 04:37:30PM -0400, Martin Thomson wrote: > On 19 May 2016 at 16:01, Viktor Dukhovni wrote: > > Nevertheless, some clients may want to attempt to gain fine-grained > > protection against correlating back to back or parallel resumption > > requests. For this they'd have to e

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Martin Thomson
On 19 May 2016 at 16:01, Viktor Dukhovni wrote: > Nevertheless, some clients may want to attempt to gain fine-grained > protection against correlating back to back or parallel resumption > requests. For this they'd have to ensure that all session tickets > are single use, and either perform new h

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Viktor Dukhovni
On Thu, May 19, 2016 at 03:45:26PM -0400, Kyle Rose wrote: > > This is only relevant to a particular type of client, and should > > not be default protocol behaviour. > > I suspect the root of arguments for/against this proposal are > philosophical more than technical. I disagree with your conten

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Kyle Rose
On Thu, May 19, 2016 at 3:19 PM, Viktor Dukhovni wrote: > It is good enough. Clients that want strong protection against > tracking by session ids can disable session caching entirely, or > set an idle timeout of ~5 seconds, Ensuring that session re-use > happens only for a quick burst of connec

Re: [TLS] Diffie-Hellman: value of Z - the shared secret - without leading zero octets

2016-05-19 Thread Russ Housley
Thanks for doing the text. Russ On May 19, 2016, at 3:22 PM, David Benjamin wrote: > If the WG agrees with this change, I've put together a PR here: > https://github.com/tlswg/tls13-spec/pull/462 > > On Tue, May 17, 2016 at 4:14 PM David Benjamin wrote: > Reviving this thread, I also think i

Re: [TLS] Key Schedule (PRs #453, #454).

2016-05-19 Thread Ilari Liusvaara
On Thu, May 19, 2016 at 12:13:45PM -0700, Eric Rescorla wrote: > On Thu, May 19, 2016 at 12:11 PM, Ilari Liusvaara > wrote: > > > On Thu, May 19, 2016 at 10:41:16AM -0700, Eric Rescorla wrote: > > > > Just one thing to be careful of: If one has off-handshake counter- > > keys[1] (like the now-rem

Re: [TLS] Diffie-Hellman: value of Z - the shared secret - without leading zero octets

2016-05-19 Thread David Benjamin
If the WG agrees with this change, I've put together a PR here: https://github.com/tlswg/tls13-spec/pull/462 On Tue, May 17, 2016 at 4:14 PM David Benjamin wrote: > Reviving this thread, I also think it would also be a good idea if 1.3 did > not stripping zeros from Z. Having this logic is rathe

Re: [TLS] Key Schedule (PRs #453, #454).

2016-05-19 Thread Eric Rescorla
On Thu, May 19, 2016 at 12:11 PM, Ilari Liusvaara wrote: > On Thu, May 19, 2016 at 10:41:16AM -0700, Eric Rescorla wrote: > > > > An additional nice point about this design is that it easily > > accomodates additional keys. For instance, if we had some post-quantum > > key exchange method, we cou

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Viktor Dukhovni
On Thu, May 19, 2016 at 03:09:23PM -0400, Kyle Rose wrote: > On Thu, May 19, 2016 at 3:05 PM, Viktor Dukhovni > wrote: > > > I think this is much too complicated. Simpler solution is for > > clients (browsers and the like for which tracking is an issue) to > > not reuse sessions when their IP

Re: [TLS] Key Schedule (PRs #453, #454).

2016-05-19 Thread Ilari Liusvaara
On Thu, May 19, 2016 at 10:41:16AM -0700, Eric Rescorla wrote: > > An additional nice point about this design is that it easily > accomodates additional keys. For instance, if we had some post-quantum > key exchange method, we could easily add its key in the final > Add-Secret or add an extra Add-

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Viktor Dukhovni
On Thu, May 19, 2016 at 11:31:53AM -0700, Eric Rescorla wrote: > Yes, I think this would be good text. PR wanted :) I think this is much too complicated. Simpler solution is for clients (browsers and the like for which tracking is an issue) to not reuse sessions when their IP address changes, an

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Kyle Rose
On Thu, May 19, 2016 at 3:05 PM, Viktor Dukhovni wrote: > I think this is much too complicated. Simpler solution is for > clients (browsers and the like for which tracking is an issue) to > not reuse sessions when their IP address changes I don't think this is sufficient. Reusing session ticket

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Kyle Rose
https://github.com/tlswg/tls13-spec/pull/461 It could probably use some cleaning up ("PSK/session ticket"). Do we also want a sentence explaining the issue? Kyle On Thu, May 19, 2016 at 2:31 PM, Eric Rescorla wrote: > Yes, I think this would be good text. PR wanted :) > > -Ekr > > On Thu, May 1

Re: [TLS] Resumption ticket/PSK

2016-05-19 Thread Eric Rescorla
Yes, I think this would be good text. PR wanted :) -Ekr On Thu, May 19, 2016 at 11:19 AM, Kyle Rose wrote: > Regarding the ability for passive observers' tracking of clients > across connections (and potentially across IPs) via a session ticket > used more than once, should there be any languag

[TLS] Resumption ticket/PSK

2016-05-19 Thread Kyle Rose
Regarding the ability for passive observers' tracking of clients across connections (and potentially across IPs) via a session ticket used more than once, should there be any language around recommended practice here, especially for clients? An appropriately-configured server can help the client a

[TLS] Key Schedule (PRs #453, #454).

2016-05-19 Thread Eric Rescorla
PR: https://github.com/tlswg/tls13-spec/pull/454 I have uploaded a PR [technically two PRs, but one builds on the other, so easier to just read the composition] which resolves two out of the three significant remaining crypto issues (the remaining one is the long-running discussion of post-handsha

Re: [TLS] [Technical Errata Reported] RFC5288 (4694)

2016-05-19 Thread Aaron Zauner
Hi, > The first step of our attack involves attacker controlled content. So yes > (phishing, unauthenticated HTTP, selective company DPI etc.). In our example > we use a local proxy to carry out the attack. I hope I can post a full > version of the actual paper and PoC to this thread soon. htt

[TLS] draft-ietf-tls-falsestart rfc editor note done

2016-05-19 Thread Stephen Farrell
Dear IESG secretariat, (bcc'd), As discussed on the telechat I've updated the intended status in the tracker, added an RFC editor note asking them to change the header and cut'n'pasted the writeup into it's proper place. So I think this one is ready for you to send the usual approval announcemen

Re: [TLS] Alia Atlas' No Objection on draft-ietf-tls-falsestart-02: (with COMMENT)

2016-05-19 Thread Bodo Moeller
Stephen Farrell : > In support of Kathleen's comment and based on the shepherd's write-up, > > why is this experimental and what is > > the experiment? > > There's no good answer, sorry. I knew folks would ask, so I asked > the WG and it seems to me to be a case that nobody cares really so > the