On Tue, Dec 1, 2015 at 11:19 AM, Eric Rescorla <e...@rtfm.com> wrote:
> Ilari, > > Thanks for your quick review. > > On Tue, Dec 1, 2015 at 10:57 AM, Ilari Liusvaara <ilariliusva...@welho.com > > wrote: > >> On Tue, Dec 01, 2015 at 10:11:17AM -0800, Eric Rescorla wrote: >> > >> > This clears out the big pipeline stall from PR#316, but probably has >> > created some bustage. Expect a series of cleanup commits and some >> > other things that were head-of-line blocked this week and then >> > draft-11 in the next week or so. Please file PRs and/or github >> > issues for any issues you see. >> >> Looks like the note about the PSK+ClientCert "attack" got lost >> somewhere. > > > See the last graf of: > http://tlswg.github.io/tls13-spec/#certificate-verify > > I pointed to the e-mail by Sam's group and also prohibit entirely > the use of cert-based client auth in pure PSK, since that > seemed safer. If you think more is needed here I would be happy > to add it. > > > While I don't think that is important as the underlying >> issue is fixed, I think there might be a note about dangers of using >> server certificates in any mode where transcript and configuration >> do not jointly imply SS. >> > > > >> Actually, scanning the editor's copy, it looks VERY broken to me: >> I don't see how server certificate verify (indirectly) signs on the old >> configuration. Such signing is required for security, as otherwise >> SS is not impiled by signature, breaking authentication. >> >> Previously, the document was clear about this... >> > > I'm sorry, but I'm not following the issue you are raising here. Perhaps > you could expand further? Here's my reasoning. > > 1. The server delivers the server configuration in handshake #0 > and signs the entire transcript with the certificate verify. At this > point the client has assurance of the server's g^s. > > 2. In handshake #1, the client sends g^x and there is authentication > for g^xs and hence the client knows that any data it is sending to the > server in 0-RTT is actually going to the server. > > 3. The server provides g^y in his ServerHello and then g^xy and g^xs > are jointly used to produce the traffic keys and also to form a MAC over > the handshake. As Hugo pointed out originally, this alone should > be sufficient to authenticate the server's side of the connection and > you could omit the server CertificateVerify (Hugo, please correct > me if I have misunderstood). > > 4. However, for consistency reasons (per the discussion in Prague), > the server *also* signs the entire transcript. This authenticates > g^y (even though the MAC with g^xs already authenticated it) > and proves possession of the signing key. > > Trying to read between the lines, is your concern that the server is > now no longer explicitly signing over the ServerConfiguration in > its CertificateVerify [Note that the client continues to do so]? > And, I should note the server's certificate. -Ekr > The idea > behind removing that was to make the 1-RTT part of the handshake > more uniform regardless of whether 0-RTT data was used. > I'm certainly open to putting that back in if it's needed, but can you > explain your concern in more detail? > > > > > In addition, PR#354 (https://github.com/tlswg/tls13-spec/pull/354) >> > implements the rekey mechanism that we discussed in Yokohama. There >> > was broad agreement to adopt something like this. I would appreciate >> > it if a few people could give it a sanity check, but absent strong >> > objections, I intend to merge this PR on Friday. >> >> The restrictions on when the rekey message can be sent: Do those >> essentially boil down to "any time after sending Finished"? >> > > Except not during 0-RTT. > > > Also, I think the requirement to immediately send the KeyUpdate >> is problematic. I think it should be requirement to send it as >> next record(s). > > >> The two aren't the same: The first seemingly requires scheduling >> extra flights, which can be problematic. The second can piggyback >> on existing flights. >> > > Good suggestion. PR welcome. :) > > -Ekr > > >> >> >> -Ilari >> > >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls