Re: [TLS] New cipher suites for SRP

2015-07-20 Thread Jeffrey Walton
>>This is possible, but you’d need to have the client and server negotiate > based on >>what they have. For example, if the server has a SRP verifier from the > current >>protocol, but the client has a stored PBKDF2 hash of the password for that > server, >>they cannot communicate and would need t

Re: [TLS] New cipher suites for SRP

2015-07-20 Thread Schmidt , Jörn-Marc
>> TLS-pwd already supports both of these. It also supports ECC too, >> which is problematic with the current SRP protocol. >In the language of the CFRG draft, TLS-pwd is “balanced” where SRP is “augmented”, >so they’re not really equivalent, correct? Correct. >This is possible, but you’d need

Re: [TLS] New cipher suites for SRP

2015-07-17 Thread Geoff Keating
> On 17 Jul 2015, at 1:38 am, Schmidt, Jörn-Marc > wrote: > >>> - Change the negotiation so that user name is not exchanged in the clear >>> - Change key exchange to do PFS > >> TLS-pwd already supports both of these. It also supports ECC too, >> which is problematic with the current SRP proto

Re: [TLS] New cipher suites for SRP

2015-07-17 Thread Schmidt , Jörn-Marc
>> - Change the negotiation so that user name is not exchanged in the clear >> - Change key exchange to do PFS >TLS-pwd already supports both of these. It also supports ECC too, >which is problematic with the current SRP protocol. I agree: Instead of modifying SRP I would prefer introducing a n

Re: [TLS] New cipher suites for SRP

2015-07-15 Thread Dan Harkins
On Mon, June 29, 2015 4:31 am, Hubert Kario wrote: > On Friday 26 June 2015 20:39:24 Geoffrey Keating wrote: >> Dave Garrett writes: >> > On Friday, June 26, 2015 07:48:01 pm Attila Molnar wrote: >> > > Currently SRP cannot be used with newer crypto primitives such as >> > > ciphers in AEAD mode