On 12/16/15, 12:16 , "Watson Ladd" <watsonbl...@gmail.com> wrote:

>On Wed, Dec 16, 2015 at 12:09 PM, Blumenthal, Uri - 0553 - MITLL
><u...@ll.mit.edu> wrote:
>> On 12/16/15, 10:50, "Watson Ladd" <watsonbl...@gmail.com> wrote:
>>>>If there are practical consequences, like loss of confidentiality – I’m
>>>> dying to hear the outline of a practical attack.
>>>
>>>The problem is that people design systems assuming something like
>>>indistinguishability. And so when you violate that assumption, all
>>>bets are off.
>>
>> I don’t buy this. AFAIK, TLS has not been designed based on that
>> assumption. And I’m not making any bets. :)
>
>What security properties does TLS provide?

When the vast majority of TLS users employ it (TLS), they expect (a) that
TLS would ensure the authenticity of their remote peer, (b) that TLS would
protect their data exchange from being eavesdropped on and/or modified,
and (c) that these hold even when the “enemy” (whoever he might be)
controls the entire communications path between them and their peers.

You can translate the above into more formal definition. :-)

>In the past TLS users have made assumptions that TLS provides security
>properties it does not.

Very true.

>The solution to this problem is to provide the security properties
>that people expect, and they expect IND.

Not necessarily so.

As far as I’m concerned, IND-* is a good property to have, but not a
“sacred cow”. 


>>>What is the actual problem with either implementing rekeying, or
>>>limiting data to something like 128 GByte per connection?
>>
>> As far as I’m concerned - none (no problem). And if there’s a way to
>> enforce rekeying sooner than that (limiting data-under-one-key to a MUCH
>> smaller amount) - I’d be in favor of that too. I just don’t accept the
>> above justification for it - and want to be shown how loss of IND
>>property
>> in TLS context leads to a practical attack.
>
>The practical attack is the loss of IND property. That's the attack.

And how does it translate into a loss of one or more of the above
properties? That’s what people want to hear. If you tell them that an
observer would be able to mathematically distinguish between truly random
data and their encrypted TLS stream (but only after 2^n blocks passed by,
and that’s their risk and exposure) - they’re likely to laugh you out of
the room.

>This is not a weakness in the proven bounds, but a mode limitation.
>Since you've agreed we can rekey more frequently

Yes I agree that we can, and probably should. Probably regardless of the
mode used, to keep things simple(r).

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to