Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-18 Thread Peter Gutmann
David McGrew writes: >What is especially cool about counter mode encryption is how its real world >security degrades more gracefully than CBC mode encryption. Uhh... how does CTR "degrade gracefully" compared to CBC? With CTR, any kind of problem with the IV/CTR leads to a catastrophic loss of

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-18 Thread Atul Luykx
What is especially cool about counter mode encryption is how its real world security degrades more gracefully than CBC mode encryption. I am not sure that the FSE paper did a good job of saying it in English as opposed to math (except for the last sentence of Section 4), but even though CTR may b

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-18 Thread David McGrew
Hi Quynh, > On Jul 13, 2016, at 9:58 AM, Dang, Quynh (Fed) wrote: > > > > On 7/13/16, 9:26 AM, "Watson Ladd" wrote: > >> On Wed, Jul 13, 2016 at 5:30 AM, Atul Luykx >> wrote: >>> Hey Quynh, >>> How can one use the distinguishing attack with the data complexity bound I sugges

Re: [TLS] Refactoring the negotiation syntax

2016-07-18 Thread Ilari Liusvaara
On Mon, Jul 18, 2016 at 06:03:08PM +0200, Eric Rescorla wrote: > On Mon, Jul 18, 2016 at 5:07 PM, Ilari Liusvaara > wrote: > > > I think the end result was insane. The problem that makes it so difficult > > is that legacy signature types, group types and protection/PRFs interact, > > so not all s

Re: [TLS] Refactoring the negotiation syntax

2016-07-18 Thread Eric Rescorla
On Mon, Jul 18, 2016 at 5:07 PM, Ilari Liusvaara wrote: > On Mon, Jul 18, 2016 at 03:27:28PM +0200, Kyle Rose wrote: > > On Wed, Jul 13, 2016 at 7:12 PM, Eric Rescorla wrote: > > > > > There have been a lot of discussions about whether we should try to > > > refactor cipher-suite negotiation to

Re: [TLS] judging consensus on keys used in handshake and data messages

2016-07-18 Thread Hugo Krawczyk
On Thu, Jul 7, 2016 at 6:44 AM, Hugo Krawczyk wrote: > I do not have an objection to option 1 if re-phrased as > Option 1 - use the same key for protecting both *post*-handshake and > applications messages.. > > I believe this is what was intended by that option anyway. Let me clarify. > > I unde

Re: [TLS] Refactoring the negotiation syntax

2016-07-18 Thread Kyle Rose
On Mon, Jul 18, 2016 at 5:07 PM, Ilari Liusvaara wrote: > > Tl;dr: I think this is a good approach because it eliminates much of the > > existing negotiation redundancy/complexity and combinatorial explosion in > > the 1.3+ ciphersuite menu. > > I recently tried to write code to handle this ciphe

Re: [TLS] Refactoring the negotiation syntax

2016-07-18 Thread Ilari Liusvaara
On Mon, Jul 18, 2016 at 03:27:28PM +0200, Kyle Rose wrote: > On Wed, Jul 13, 2016 at 7:12 PM, Eric Rescorla wrote: > > > There have been a lot of discussions about whether we should try to > > refactor cipher-suite negotiation to be less monolithic in the cipher > > suite. I've generally been on

Re: [TLS] Comments on TLS-ECJ-PAKE draft

2016-07-18 Thread Watson Ladd
On Mon, Jul 18, 2016 at 3:06 AM, Dan Harkins wrote: > > Hi Robert, > > This draft moves the NamedCurve/EllipticCurveList into the > ClientHello, and since the client sends X1 and ZKP(X1) in the > ClientHello it means that is going to be a list of 1. It basically > moves the client's key exchan

Re: [TLS] Thoughts on Version Intolerance

2016-07-18 Thread David Benjamin
If we keep trying to salvage the ClientHello version number, we will be chasing down intolerance forever. (And I'm honestly bored of doing that.) I'd prefer we move it to an extension. Either an empty indicator extension for each version or a single version extension with a list of versions. Or may

Re: [TLS] Refactoring the negotiation syntax

2016-07-18 Thread Kyle Rose
On Wed, Jul 13, 2016 at 7:12 PM, Eric Rescorla wrote: > There have been a lot of discussions about whether we should try to > refactor cipher-suite negotiation to be less monolithic in the cipher > suite. I've generally been on the "no" side of that on cost/benefit > grounds as well as not quite

Re: [TLS] Thoughts on Version Intolerance

2016-07-18 Thread Ilari Liusvaara
On Mon, Jul 18, 2016 at 01:08:43PM +0200, Hanno Böck wrote: > Hi, > > Recently both Adam Langley [1] and David Benjamin [2] indicated that > they expect with TLS 1.3 Browsers will have to bring back the infamous > version falbacks that caused so much trouble in the past (POODLE etc.) > to work aro

Re: [TLS] Thoughts on Version Intolerance

2016-07-18 Thread Hubert Kario
On Monday 18 July 2016 13:08:43 Hanno Böck wrote: > * There don't seem to be any straightforward tools that test for > version intolerance. The SSL Labs test does detect version > intolerance, but it's limited to public facing https servers and it > doesn't seem to detect some of the weirder

[TLS] Thoughts on Version Intolerance

2016-07-18 Thread Hanno Böck
Hi, Recently both Adam Langley [1] and David Benjamin [2] indicated that they expect with TLS 1.3 Browsers will have to bring back the infamous version falbacks that caused so much trouble in the past (POODLE etc.) to work around broken implementations of the TLS handshake. I don't blame browser

Re: [TLS] Comments on TLS-ECJ-PAKE draft

2016-07-18 Thread Dan Harkins
Hi Robert, This draft moves the NamedCurve/EllipticCurveList into the ClientHello, and since the client sends X1 and ZKP(X1) in the ClientHello it means that is going to be a list of 1. It basically moves the client's key exchange portion from ClientKeyExchange into ClientHello. So basically,