On Dec 30, 2015 7:08 PM, "Ilari Liusvaara" <ilariliusva...@welho.com> wrote:
>
> On Thu, Dec 31, 2015 at 09:55:10AM +1100, Martin Thomson wrote:
> > On 30 December 2015 at 22:16, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:
> > >> Would it make sense to have session hash as a requirement in TLS
> > >> 1.2 when you want to use Curve25519?
> > >
> > > I don't think that is reasonable.
> >
> > I think that is entirely reasonable.  TLS 1.2 relies on contributory
> > behaviour.  25519 doesn't provide that unless you do some extra
> > checking that we know many implementations don't do.
> >
> > I'd be OK with either requiring session hash, some checking of values,
> > or both.  Otherwise we create a situation where the shared secret can
> > be forced by an attacker.
>
> The draft already has the checks.
>
> I also think I figured out a way to truly force contributory behaviour
> without any checks:
>
> It is a bit nasty hack: Throw the exchange keys into the PMS, expanding
> it from 32/56 bytes to 96/168 bytes.

Why not hash the public values into the result of the key exchange? I don't
want security to depend on omittable checks.
>
>
> -Ilari
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to