On Fri, Aug 28, 2015 at 11:07:02AM -0700, Martin Thomson wrote:

> This seems fine to me, though I'll note that 7250 only really saves
> you space when it comes down to it.  You can wrap your raw public key
> in a certificate, just like we do in WebRTC, and then you don't need
> 7250 support in your library.  Noting you can only do any of these
> variations in a context where there is some preexisting understand
> that what you choose to use is acceptable to the other side.

Indeed that's effectively what you get with DANE TLSA "3 1 1", when
the client, the server or at present typically both don't support
RFC 7250.

> Regarding the explicit nature of having an explicit DH_anon signal, I
> tend to think that (on balance) removing this signal does more good
> than harm.  I expect certain others to disagree, of course, but we can
> talk about why a vigorous defense of the cipher suite signal isn't a
> good use of their energy later.

The signal has pros and cons.  Absent channel-binding at the next
layer up, it makes it clear to adversaries that active attacks are
"safe".  On the other hand, it allows servers to detect that a
client is not planning to authenticate the server, which has forensic
value, and can be used to grant appropriately restricted access.

Furthermore, anon-DH has strong privacy properties, the server
sends no identity information, not even a public key.  Any
channel-binding at the next layer is privacy protected.

The proposal to use raw public keys sends a similar signal to
servers that don't publish DANE-EE(3)/SPKI(1) TLSA records.  X.509
clients can no longer to PKIX authentication.  A server that does
publish DANE-EE(3)/SPKI(1) records on the other hand can no longer
conclude that authentication is not done.  And of course clients
may be doing public key pinning, be it TOFU, or via some out-of-band
means.

Clearly getting along without anon_DH is possible, since many
servers or clients don't enable anon_DH ciphers and yet interoperate
just fine with those that do.  

My view is that anon_DH should either be supported properly (be
defined for the same symmetric cipher combinations as ciphersuites
with certs or public keys) or as proposed not supported at all.

Replacement by public keys is not semantically equivalent, it just
saves a bit of network and code space relative to self-signed X.509.
So I'm not yet convinced that the proposal is progress, we lose
some and gain some.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to