Re: [TLS] TLS ECDSA nonce reuse attack?

2022-08-17 Thread Peter Gutmann
Robert Moskowitz writes: >The article is unclear if this is a TLS 1.2 and/or 1.3 problem. It does >claim that 1.3 does not fix all problems with TLS. It's neither TLS 1.2 or 1.3, it's an ECDSA problem. The paper happened to use TLS because it's a convenient way to probe the Internet for proble

Re: [TLS] Getting started, clock not set yet

2022-08-17 Thread Peter Gutmann
Kyle Rose writes: >I wish I had some more context for this area of embedded devices. For example: > > * Why is an RTC more expensive (along whatever axis you choose) than a NIC >(wifi or ethernet)? Quoting "IoT / SCADA Crypto, What you Need to Know": The device often won't have any on-board t

Re: [TLS] Getting started, clock not set yet

2022-08-17 Thread Kyle Rose
On Wed, Aug 17, 2022 at 11:10 AM Peter Gutmann wrote: > See my earlier comments on this. > Honestly, it sounds like these devices maybe shouldn't be using internet technologies that were designed with certain assumptions about extensibility in mind. With such strong constraints not only on behav

Re: [TLS] Getting started, clock not set yet

2022-08-17 Thread Peter Gutmann
Kyle Rose writes: >IMO, the two requirements "Prohibit upgrades" and "Leverage general-purpose >network protocols with large attack surfaces" are in direct conflict. Only if you implement them with large attack surfaces, for which again see my earlier comments. Peter. _

Re: [TLS] Getting started, clock not set yet

2022-08-17 Thread Kyle Rose
On Wed, Aug 17, 2022 at 11:34 AM Peter Gutmann wrote: > Kyle Rose writes: > > >IMO, the two requirements "Prohibit upgrades" and "Leverage > general-purpose > >network protocols with large attack surfaces" are in direct conflict. > > Only if you implement them with large attack surfaces, for whi

Re: [TLS] Getting started, clock not set yet

2022-08-17 Thread Peter Gutmann
Kyle Rose writes: >A large attack surface can't be avoided with the MTI for these protocols. It can be vastly reduced by only implementing the MTI rather than every possible bell and whistle in existence. Also since an RTU (remote terminal unit) doesn't need to talk to every single piece of bro

[TLS] Delegated Credentials Test Vectors

2022-08-17 Thread Jonathan Hoyland
Hi All, I've been putting together a generator for test vectors for DCs. This code is available as a PR at https://github.com/tlswg/tls-subcerts/pull/119 The vectors generated are for: Leaf public key signature algorithm - DC public key signature algorithm 1. ECDSA (P-384) - EdDSA (Ed25519)

Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

2022-08-17 Thread Scott Fluhrer (sfluhrer)
So that we get an initial answer to this (so we can put it into the draft - of course, we can debate what's in the draft...) Illari suggested: X25519+Kyber768 P384+Kyber768 Well, I would suggest adding in X25519+Kyber512 For those situations where we need to limit the message size (perhaps DT

Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

2022-08-17 Thread Kris Kwiatkowski
I support those choices, but would also add P256+Kyber512. * (1) same reason as below (by Scott) * (2) to be able to declare security of generated keys in FIPS-mode for   _both_ - classical and post-quantum schemes (once Kyber is standardized). After double-checking with NIST today, currently

Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

2022-08-17 Thread Kampanakis, Panos
+1 on the 3 proposed by Scott and P256+Kyber512 proposed by Kris. From: TLS On Behalf Of Kris Kwiatkowski Sent: Wednesday, August 17, 2022 3:31 PM To: tls@ietf.org Subject: RE: [EXTERNAL][TLS] WGLC for draft-ietf-tls-hybrid-design CAUTION: This email originated from outside of the organization.

Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

2022-08-17 Thread Kampanakis, Panos
I forgot to suggest to add a paragraph in the Sec Considerations section about Kyber-512. Kyber-512 offers a CoreSVP hardness of ~120 bits of security which is a little lower than it should. The Kyber submission refines the CoreSVP cost by using sieving cost simulations and claims that the gate

Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

2022-08-17 Thread Blumenthal, Uri - 0553 - MITLL
+1 on the 3 proposed by Scott and P256+Kyber512 proposed by Kris. “Me too”: +1 to the above. From: TLS On Behalf Of Kris Kwiatkowski Sent: Wednesday, August 17, 2022 3:31 PM To: tls@ietf.org I support those choices, but would also add P256+Kyber512. * (1) same reason as below (by Scott) *

Re: [TLS] WGLC for draft-ietf-tls-hybrid-design

2022-08-17 Thread Martin Thomson
On Sat, Aug 13, 2022, at 04:13, Scott Fluhrer (sfluhrer) wrote: > Well, if we were to discuss some suggested hybrids (and we now know the > NIST selection), I would suggest these possibilities: > > - X25519 + Kyber512 > - P256 + Kyber512 > - X448 + Kyber768 > - P384 + Kyber768 Any specific pairs