[TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Eric Rescorla
Hi folks, Please take a look at the following PR which documents a suggestion made by Karthik Bhargavan about how to prevent protection against downgrade against downgrade from TLS 1.3 to TLS 1.2 and below. https://github.com/tlswg/tls13-spec/pull/284 The idea is that if a TLS 1.3 server recei

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Karthikeyan Bhargavan
A few more words on this proposal. - The goal is to protect TLS 1.3 clients and servers from attacks on TLS 1.* ciphersuites. E.g. if a new attack on the MD5 | SHA1 concatenation in TLS 1.0 is announced, connections between TLS 1.3 clients and servers would still be protected. Similarl

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Yngve N. Pettersen
On Fri, 09 Oct 2015 12:48:38 -, Karthikeyan Bhargavan wrote: - We note that RSA ciphersuites already provide a version downgrade mitigation, although it has itself caused many headaches due to bleichenbacher attacks. But if a server implements good side-channel resistance to blei

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Karthikeyan Bhargavan
> For reference, the version field in the TLS premaster secret is not checked > by many servers, IIRC some of them have large market shares. That’s good to know. It would be tempting to recommend that TLS 1.3 servers disable RSA (encryption) ciphersuites for all protocol versions, but I guess

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Eric Rescorla
On Fri, Oct 9, 2015 at 3:09 PM, Karthikeyan Bhargavan < karthik.bharga...@gmail.com> wrote: > > > For reference, the version field in the TLS premaster secret is not > checked by many servers, IIRC some of them have large market shares. > > That’s good to know. It would be tempting to recommend th

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Short, Todd
On Oct 9, 2015, at 8:48 AM, Karthikeyan Bhargavan mailto:karthik.bharga...@gmail.com>> wrote: - There is a 1/(2^N) chance that valid connections to TLS 1.2 servers will be dropped by TLS 1.3 clients, because of this proposal. This only happens for servers that do not use the unix timest

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Eric Rescorla
On Fri, Oct 9, 2015 at 3:23 PM, Short, Todd wrote: > > > On Oct 9, 2015, at 8:48 AM, Karthikeyan Bhargavan < > karthik.bharga...@gmail.com> wrote: > > - There is a 1/(2^N) chance that valid connections to TLS 1.2 servers will > be dropped by >TLS 1.3 clients, because of this proposal. This on

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Viktor Dukhovni
On Fri, Oct 09, 2015 at 02:23:30PM +0200, Eric Rescorla wrote: > Hi folks, > > Please take a look at the following PR which documents a suggestion > made by Karthik Bhargavan about how to prevent protection against > downgrade against downgrade from TLS 1.3 to TLS 1.2 and below. > > https://gi

Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-10-09 Thread Joseph Salowey
The chairs have read through this thread and do not see any new information that would cause the working group to reconsider the decision to remove compression from TLS 1.3. Discussions about clarifying the language and intent of the document are OK. Thanks, J&S On Thu, Oct 8, 2015 at 6:42 PM,

Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-10-09 Thread Martin Rex
Joseph Salowey wrote: > > The chairs have read through this thread and do not see any new information > that would cause the working group to reconsider the decision to remove > compression from TLS 1.3. I am (and I was) perfectly fine with removing compression from TLSv1.3. (btw. our own implemen

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Dave Garrett
On Friday, October 09, 2015 12:49:02 pm Viktor Dukhovni wrote: > I think this is "too clever" (a "hack" not a design) and offers Every fix to an issue in this 20 year old protocol will be a hack. > incomplete protection (does nothing to protect RSA key transport). Better than none, for a very lo

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Eric Rescorla
It's largely arbitrary, but the reasoning is as follows. There are apparently some TLS 1.2 servers which randomly generate the entire server random (and https://tools.ietf.org/html/draft-mathewson-no-gmtunixtime-00 would encourage more to do so). The chance of a false positive between such a server

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Viktor Dukhovni
On Fri, Oct 09, 2015 at 10:23:09PM +0200, Eric Rescorla wrote: > It's largely arbitrary, but the reasoning is as follows. There are > apparently some TLS 1.2 servers which randomly generate the entire server > random (and https://tools.ietf.org/html/draft-mathewson-no-gmtunixtime-00 > would > enc

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Dave Garrett
On Friday, October 09, 2015 04:38:00 pm Viktor Dukhovni wrote: > So even 2^{-48} is perhaps not quite low enough. Going to a full 64-bit looks like a good idea to me. The loss of those 4 bytes of entropy for old versions isn't likely to matter at all, though, please correct me if someone thinks

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Salz, Rich
> It's largely arbitrary, but the reasoning is as follows. And so that we can put "TLS1.3" as the six bytes in UTF-8. ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-10-09 Thread Martin Rex
Watson Ladd wrote: > > Why is it important that clients be permitted to signal support for > compression and TLS 1.3 conditionally? Remember, we also want to phase > out the use of compression in TLS 1.2. compression in TLS is *NOT* generally bad, and not generally a problem. It may be a problem

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Brian Smith
On Fri, Oct 9, 2015 at 2:23 AM, Eric Rescorla wrote: > Please take a look at the following PR which documents a suggestion > made by Karthik Bhargavan about how to prevent protection against > downgrade against downgrade from TLS 1.3 to TLS 1.2 and below. > > https://github.com/tlswg/tls13-spec

Re: [TLS] PR for anti-downgrade mechanism

2015-10-09 Thread Karthikeyan Bhargavan
> 1. Why would the server ever receive a TLS 1.2 or below ClientHello from a > client that supports TLS 1.3? Why doesn't the already-standardized downgrade > SCSV mechanism work for those cases? The attack we’re protecting against is the following: - a TLS 1.3 client sends a client hello and the