On Fri, Sep 4, 2015 at 8:58 AM, Russ Housley <hous...@vigilsec.com> wrote:
> Eric: > > I looked at Hugo's message in the context of the table in Section 7.1: > > Key Exchange Static Secret (SS) Ephemeral Secret (ES) > ------------ ------------------ --------------------- > (EC)DHE Client ephemeral Client ephemeral > (full handshake) w/ server ephemeral w/ server ephemeral > > (EC)DHE Client ephemeral Client ephemeral > (w/ 0-RTT) w/ server static w/ server ephemeral > > PSK Pre-Shared Key Pre-shared key > > PSK + (EC)DHE Pre-Shared Key Client ephemeral > w/ server ephemeral > > If I understand Hugo's message correctly, he is saying that in the second > row, the SS must be part of the key derivation. I think we need to > consider the bottom row as well. > > It seems to me that using the master_secret capture the benefits of both > the SS and the ES. This meets Hugo's requirement for the second row, and > gets the benefits of the ephemeral values for the bottom row. > I don't think you are reading that correctly. The point is that in the case where SS is authenticated (e.g., a PSK or a static DH), then the Finished MAC authenticates the ServerKeyShare. If you include ES in the Finished key, then you are using ES to authenticate ServerKeyShare, which apparently makes analysis harder. -Ekr Russ > > > On Sep 4, 2015, at 11:33 AM, Eric Rescorla wrote: > > See: > http://www.ietf.org/mail-archive/web/tls/current/msg17184.html > > On Fri, Sep 4, 2015 at 8:27 AM, Russ Housley <hous...@vigilsec.com> wrote: > >> In Section 7.1, the document says: >> >> 4. finished_secret = HKDF-Expand-Label(xSS, >> "finished secret", >> handshake_hash, L) >> >> 5. resumption_secret = HKDF-Expand-Label(master_secret, >> "resumption master secret" >> session_hash, L) >> >> Why don't we use the master_secret in both the finished_secret and the >> resumption_secret formula? >> >> Russ >> > >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls