[TLS]Re: Resumption vs. RFC6066 maximum_fragment_length

2024-06-07 Thread Hubert Kario
On Friday, 7 June 2024 08:42:51 CEST, Viktor Dukhovni wrote: As is well known, the RFC6066 maximum_fragment_length (MFL) extension has a few serious deficiencies, that led to its subsequent deprecation in favour of RFC8449 record_size_limit (RSL). Nevertheless a number of TLS implementations sti

[TLS]Re: Resumption vs. RFC6066 maximum_fragment_length

2024-06-07 Thread Viktor Dukhovni
On Fri, Jun 07, 2024 at 01:04:33PM +0200, Hubert Kario wrote: > On the other hand the RFC states (section 1.1): > > ... > A client that requests > session resumption does not in general know whether the server will > accept this request, and therefore it SHOULD send the same extensions >

[TLS]Re: Curve-popularity data?

2024-06-07 Thread D. J. Bernstein
Hubert Kario writes: > Fedora 39, openssl-3.1.1-4.fc39.x86_64, i7-10850H > x25519 derive shared secret: 35062.2 op/s > P-256 derive shared secret: 22741.1 op/s The Intel Core i7-10850H microarchitecture is Comet Lake. To see numbers from current code, I tried the script below on a Comet Lake (Inte

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Hubert Kario
On Friday, 7 June 2024 15:54:17 CEST, D. J. Bernstein wrote: Hubert Kario writes: Fedora 39, openssl-3.1.1-4.fc39.x86_64, i7-10850H x25519 derive shared secret: 35062.2 op/s P-256 derive shared secret: 22741.1 op/s The Intel Core i7-10850H microarchitecture is Comet Lake. To see numbers from c

[TLS]Re: Curve-popularity data?

2024-06-07 Thread A A
But X25519, X448, which are mark as safe in safecurves are protected against certain side-channel and other attacks, not only performance advantage. 07.06.2024, 22:33, "Hubert Kario" :On Friday, 7 June 2024 15:54:17 CEST, D. J. Bernstein wrote: Hubert Kario writes: Fedora 39, openssl-3.1.1-4.fc39.x

[TLS]Re: Curve-popularity data?

2024-06-07 Thread John Mattsson
Hubert Kario wrote: >Such small differences in performance should absolutely have no effect on >IETF selecting an algorithm or not. I completely disagree. As long as people argue that we need symmetric rekeying and reuse of key share because the ephemeral key exchange algorithms are slow, I thin

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Hubert Kario
On Friday, 7 June 2024 17:29:35 CEST, John Mattsson wrote: Hubert Kario wrote: Such small differences in performance should absolutely have no effect on IETF selecting an algorithm or not. I completely disagree. As long as people argue that we need symmetric rekeying and reuse of key share be

[TLS]Re: Curve-popularity data?

2024-06-07 Thread John Mattsson
>so we should also remove X448, as it's much slower than X25519? That does not follow from what I said. I think the important metric is performance/security. P-256 does basically not have any benefits compared to X25519 (excepts a few bits of security more) but these are quite irrelevant compar

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Scott Fluhrer (sfluhrer)
Does X448 actually provide "a huge advantage" in security (practically speaking) over X25519? On a classical computer, the best known attack against X25519 requires circa 2^126 point addition operations - that is generally accepted as being infeasible. Attacking X448 requires far more point ad

[TLS]Re: [EXTERNAL] Re: Curve-popularity data?

2024-06-07 Thread william.lay...@cyber.nsa.gov
Since I was quoted, I should say that my words may have made more sense in context, and if not I apologize. To be clear, we do not anticipate supporting hybrid in NSS due to the increased development time and validation burden. In those cases where it is necessary due to protocol constraints,

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Eric Rescorla
On Fri, Jun 7, 2024 at 8:52 AM John Mattsson wrote: > >so we should also remove X448, as it's much slower than X25519? > > That does not follow from what I said. I think the important metric is > performance/security. P-256 does basically not have any benefits compared > to X25519 (excepts a few

[TLS]Re: [EXTERNAL] Re: Curve-popularity data?

2024-06-07 Thread John Mattsson
>I really do not understand this argument, given that the DoD has explicitly >said they aren't doing that. I think it is a bit unclear what CNSA 2.0 says: - They say that CNSA 2.0 compliant browsers need to support ML-KEM-1024 by 2025. - The also say that “NSA does not approve using pre-standardi

[TLS]Re: Curve-popularity data?

2024-06-07 Thread D. J. Bernstein
Hubert Kario writes: > I think the openssl compile is missing the `enable-ec_nistp_64_gcc_128` > option? Results on the same Comet Lake of a fresh run of the script with that option added to the Configure line: op op/s 256 bits ecdh (nistp256) 0.0001s 12184.

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Hubert Kario
On Friday, 7 June 2024 19:08:22 CEST, D. J. Bernstein wrote: Hubert Kario writes: I think the openssl compile is missing the `enable-ec_nistp_64_gcc_128` option? Results on the same Comet Lake of a fresh run of the script with that option added to the Configure line:

[TLS]Re: Curve-popularity data?

2024-06-07 Thread D. J. Bernstein
Eric Rescorla writes: > I'm struggling to understand what people think is at stake here. The WG will soon be faced with decisions regarding which curve+PQ hybrids to recommend for TLS. Regarding the curve-choice part of that, some context factors that have been raised (such as interoperability and

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Richard Barnes
On Fri, Jun 7, 2024 at 2:40 PM D. J. Bernstein wrote: > Eric Rescorla writes: > > I'm struggling to understand what people think is at stake here. > > The WG will soon be faced with decisions regarding which curve+PQ > hybrids to recommend for TLS. As has been noted elsewhere, the relevant IANA

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Sophie Schmieg
Eliminating P256 will not be possible, primarily due to FIPS 140 compliance concerns. From what I have heard from NIST, there are no current plans on adding X25519 to the NIST approved curves, mostly in order to encourage people to transition to PQC instead of ECC. From that point of view, I would

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Salz, Rich
As has been noted elsewhere, the relevant IANA registries are Specification Required. The TLS WG doesn't need to do anything for a curve+PQ hybrid to be used with TLS. Then why has it adopted a draft? I asked these of you a few days ago and you did not reply. _

[TLS]Re: Curve-popularity data?

2024-06-07 Thread D. J. Bernstein
Richard Barnes writes: > The TLS WG doesn't need to do anything for a curve+PQ hybrid to > be used with TLS. As I said, the WG will be faced with decisions regarding which of the curve+PQ hybrids to _recommend_ for TLS. Sure, more things will be registered, but the question of what to recommend is

[TLS]Re: Curve-popularity data?

2024-06-07 Thread D. J. Bernstein
Sophie Schmieg writes: > From what I have heard from NIST, there are no current plans on > adding X25519 to the NIST approved curves, mostly in order to encourage > people to transition to PQC instead of ECC. Sorry, which document are you referring to? This isn't in line with the NIST announcement

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Eric Rescorla
On Fri, Jun 7, 2024 at 11:41 AM D. J. Bernstein wrote: > Eric Rescorla writes: > > I'm struggling to understand what people think is at stake here. > > The WG will soon be faced with decisions regarding which curve+PQ > hybrids to recommend for TLS. It's important to distinguish between two sen

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Robert Relyea
On 6/7/24 2:36 PM, Eric Rescorla wrote: On Fri, Jun 7, 2024 at 11:41 AM D. J. Bernstein wrote: Eric Rescorla writes: > I'm struggling to understand what people think is at stake here. The WG will soon be faced with decisions regarding which curve+PQ hybrids to recommend for T

[TLS]Re: HRR support (was something else)

2024-06-07 Thread Syed Suleman Ahmad
Hi folks, Adding a bit more color to the original discussion. We, at Cloudflare, have been scanning our customer's origin servers [1] for TLS 1.3 key exchange algorithm support. As part of this effort (motivation: measuring post-quantum readiness), we also send empty or unknown keyshare in the Cl

[TLS]Re: Curve-popularity data?

2024-06-07 Thread D. J. Bernstein
Eric Rescorla writes: > It's important to distinguish between two senses of the word "recommend". I'd expect the first wave of proposals to be asking the WG to say Recommended=Y for various curve+PQ hybrids. There will be an annoyingly large number of options on the PQ side---for example, for dif

[TLS]Re: HRR support (was something else)

2024-06-07 Thread Rob Sayre
On Fri, Jun 7, 2024 at 6:34 PM Syed Suleman Ahmad > > So far we have seen that HRR incompatibility is NOT related to the choice > of keyshare, or whether the first Client Hello fits in a single packet or > not. It is simply lack of HRR support. > While the aggregate stats are good to check, what