[TLS] OpSec WGLC for draft-ietf-opsec-ns-impact

2020-08-17 Thread Nick Lamb
I am not very familiar with IETF working group practices, however it strikes me as surely unusual to have a document enter Last Call (supposedly believed by its owners to be ready for publication) and yet immediately then be revised showing it was in fact not ready at all. However this seems to be

[TLS] TLS WG Virtual Interim on ECH

2020-08-17 Thread Joseph Salowey
The chairs would like to have an interim to resolve the remaining open issues for ECH. Since we need 2 weeks notice we are targeting the week of September first. Please fill out the following with your available times if you are interested in attending: https://doodle.com/poll/wa4633uafmvdr9hv

[TLS] ECH usage indication: alternatives to trial decryption?

2020-08-17 Thread Christopher Patton
Hi list, In the current ECH specification (draft-ietf-tls-esni-07), the server provides no indication of whether the inner or outer ClientHello (CH) was used. This means the client must do trial decryption to make this determination, which creates implementation complexity and potentially raises s

[TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Christopher Wood
HPKE recently removed the Hash() interface from the KDF, which means we need to either (a) change how the config_digest (formerly record_digest) is computed, or (b) constrain ECH to HKDF-based HPKE ciphersuites. This PR takes approach (b): https://github.com/tlswg/draft-ietf-tls-esni/pull/27

[TLS] ECH padding edge cases

2020-08-17 Thread Christopher Wood
Ben Schwartz found some problems and edge cases with the current ECH padding policy text [1]. This PR proposes a fix: https://github.com/tlswg/draft-ietf-tls-esni/pull/268 Please have a look and provide feedback. Thanks, Chris [1] https://github.com/tlswg/draft-ietf-tls-esni/issues/252 __

Re: [TLS] ECH usage indication: alternatives to trial decryption?

2020-08-17 Thread David Benjamin
Thanks for writing this up! We've been pondering this subject as well, as part of identifying places where ECH and QUIC interact interestingly. (The other being the padding issue in https://github.com/tlswg/draft-ietf-tls-esni/issues/264.) As with the padding issue, QUIC replaces the record layer,

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Martin Thomson
On Tue, Aug 18, 2020, at 07:09, Christopher Wood wrote: > HPKE recently removed the Hash() interface from the KDF, which means we > need to either (a) change how the config_digest (formerly > record_digest) is computed, or (b) constrain ECH to HKDF-based HPKE > ciphersuites. This PR takes approa

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Christopher Patton
Hi Martin, > Or maybe just running the HPKE KDF with a fixed input. Do you mean something like this? Let `config_digest = KDF.extract("some salt", "some label", config)`, where `config` is the ECH configuration? Unless I've missed something critical, you don't need any sort of preimage > resist

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Martin Thomson
On Tue, Aug 18, 2020, at 07:55, Christopher Patton wrote: > Hi Martin, > > > Or maybe just running the HPKE KDF with a fixed input. > Do you mean something like this? Let `config_digest = KDF.extract("some > salt", "some label", config)`, where `config` is the ECH configuration? Sure. I wo

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Christopher Patton
Just to be clear, you're proposing something like this? Referring to the KDF API called for in draft-irtf-cfrg-hpke-05: config_digest = Expand(PRK=Extract("some_salt", "some_label", IKM=config), "some_info", 16) It's maybe more hashing than necessary, but I'd be good with this. Chris P. _

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Christopher Wood
On Mon, Aug 17, 2020, at 3:30 PM, Martin Thomson wrote: > > > On Tue, Aug 18, 2020, at 07:55, Christopher Patton wrote: > > Hi Martin, > > > > > Or maybe just running the HPKE KDF with a fixed input. > > Do you mean something like this? Let `config_digest = KDF.extract("some > > salt", "some

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Martin Thomson
On Tue, Aug 18, 2020, at 09:04, Christopher Patton wrote: > Just to be clear, you're proposing something like this? Referring to > the KDF API called for in draft-irtf-cfrg-hpke-05: > > config_digest = Expand(PRK=Extract("some_salt", "some_label", > IKM=config), "some_info", 16) > It's maybe

Re: [TLS] Constraining ECH to HKDF-based HPKE ciphersuites

2020-08-17 Thread Christopher Patton
I worked out this suggestion into a PR: https://github.com/tlswg/draft-ietf-tls-esni/pull/276 Please have a look! Chris P. On Mon, Aug 17, 2020 at 4:28 PM Martin Thomson wrote: > > > On Tue, Aug 18, 2020, at 09:04, Christopher Patton wrote: > > Just to be clear, you're proposing something like

Re: [TLS] comments on draft-subcerts

2020-08-17 Thread Sofía Celi
Dear Nick and list, The PR is here now: https://github.com/tlswg/tls-subcerts/pull/79 Looking forward to been submitted to WGLC#2. Thanks! -- Sofía Celi @claucece http://claucece.github.io/ Cryptographic research and implementation at many places, but mainly at Cloudflare FAB9 3EDC 7CDD 1198 DC