On Thu, Oct 8, 2015 at 12:16 PM, Simon Josefsson <si...@josefsson.org>
wrote:

> Eric Rescorla <e...@rtfm.com> writes:
>
> > On Thu, Oct 8, 2015 at 11:29 AM, Simon Josefsson <si...@josefsson.org>
> > wrote:
> >
> >> The notes from the interim meeting mentions 'tls-unique' and points to
> >> issue #228 on github.  I want to get your attention on the draft below.
> >> Doesn't it do what you are looking for?  There is a little in the way of
> >> a problem statement in the TLS interim meeting notes, so it is hard to
> >> tell what the perceived problem with 'tls-unique' is in this context.
> >> Does my draft need to be updated for TLS 1.3 in any way?  It might serve
> >> as a starting point for future work.
> >>
> >> https://tools.ietf.org/html/draft-josefsson-sasl-tls-cb-03
> >
> >
> > Well, TLS 1.3 doesn't have a PRF, but instead explicitly uses HKDF.
> >
> > With that said, I don't really understand the structure of your draft:
> > Instead of referencing the PRF and session_hash directly, why not instead
> > use RFC 5705 exporters and require the use of the session_hash
> > extension?
>
> The introduction says:
>
>    There exists a TLS extension [I-D.ietf-tls-session-hash] that modify
>    TLS so that the definition of 'tls-unique' [RFC5929] has the intended
>    properties.  If widely implemented and deployed, the channel binding
>    type in this document would not offer any additional protection.  The
>    purpose of this document is to provide an alternative channel binding
>    that offers the intended properties without requiring TLS protocol
>    changes.  However, keep in mind that TLS implementations needs to
>    offer the appropriate APIs necessary to be able to implement the
>    channel binding described in this document.
>
> I agree that one alternative is to require session_hash for all
> connections.


Given that you need to modify *some* software in any case, it seems
like one ought to adopt session-hash.



>   But then what is the problem with use of 'tls-unique'?
>

The general consensus is that 96 bits is too short.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to