[TLS] FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread John Mattsson
Hi, When using X25519MLKEM768, I would like to know that the other peer is not reusing its key share (as long as it is compliant). As a server reusing a key share can have catastrophic security consequences for the client, I think this is a _very_ reasonable request. https://emanjon.github.io/N

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread Viktor Dukhovni
On Sun, Mar 09, 2025 at 02:02:55PM +, John Mattsson wrote: > Viktor Dukhivni wrote: > >However, you'll be thrilled to learn that it is not possible for a TLS > >server to reuse its ML-KEM keyshare when a client uses a fresh ephemeral > >ML-KEM keyshare. > > Yes, that solves half the problem,

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread Viktor Dukhovni
On Sun, Mar 09, 2025 at 03:16:46PM +, John Mattsson wrote: > I don't think time is the important factor. The important thing is > that encapsulation keys used with different servers are independent. > If you have a timing side channel in KEM.Decaps(dk, c) that leaks the > encapsulation key, th

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread Salz, Rich
So your concern would be resolved by an IETF RFC? To me, that says that you are concerned about mistakes from well-meaning people, not true adversaries. ___ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org

[TLS] Public side meetings on identity crisis in attested TLS for Confidential Computing

2025-03-09 Thread Muhammad Usama Sardar
(Note for TLS WG only: announcing with approval of chairs [0]) Hi all, *TL;DR*: There will be a couple of /public side meetings/ on attested TLS. For organizational purposes (e.g., to ask for a bigger room [current room capacity: 20]), if you are interested in presenting or attending /in-pers

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread Viktor Dukhovni
On Sun, Mar 09, 2025 at 12:33:38PM +, John Mattsson wrote: > I find the current situation of key shares being reused without the > other peer knowing inacceptable and frankly the worst possible option. In general terms, your expectations are unrealistic, the best you can do, if you think you'

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread John Mattsson
Salz, Rich wrote: >I am curious why this is worse than, say, knowing that the server reports >SSLKEYLOGFILE into a public >S3 bucket or similar? And do you think a real adversary would self-report that >they are using >ephemeral keys? I was comparing these three options: A. Key shares being reu

[TLS] Re: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread Salz, Rich
I find the current situation of key shares being reused without the other peer knowing inacceptable and frankly the worst possible option. I am curious why this is worse than, say, knowing that the server reports SSLKEYLOGFILE into a public S3 bucket or similar? And do you think a real adversar

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread John Mattsson
Viktor Dukhivni wrote: >Guidance to encourage fresh keys every ~5 minutes and every ~10 users is not >unreasonable. I don't think time is the important factor. The important thing is that encapsulation keys used with different servers are independent. If you have a timing side channel in KEM.De

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread Viktor Dukhovni
On Sun, Mar 09, 2025 at 11:17:10PM -, D. J. Bernstein wrote: > Viktor Dukhovni writes: > > However, you'll be thrilled to learn that it is not possible for a TLS > > server to reuse its ML-KEM keyshare when a client uses a fresh ephemeral > > ML-KEM keyshare. > > "Not possible"? > > In ECDH,

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-09 Thread D. J. Bernstein
Viktor Dukhovni writes: > However, you'll be thrilled to learn that it is not possible for a TLS > server to reuse its ML-KEM keyshare when a client uses a fresh ephemeral > ML-KEM keyshare. "Not possible"? In ECDH, or more precisely ElGamal encrypton: Alice sends A = aG; Bob sends B = bG and C =