On Tue, Jan 12, 2016 at 9:13 AM, Yoav Nir <ynir.i...@gmail.com> wrote:
> Hi, Peter
>
> Ignoring for a moment the merits of this proposal vs the TLS 1.3 (or 2.0) 
> that this WG is working on right now, why?
>
> Other groups are not working on HTTP/1.2 or IKEv1.1 or any other 
> $protocolv$(major-1).$(minor+1).
>
> Any TLS library that exists now doesn’t have an implementation of either 
> “your” TLS 1.3 or “our” TLS 1.3. To get either, you’ll need to get an 
> upgraded version of your favorite library. So the upgrade path is no smoother 
> for either protocol.   If this had been brought up before the work on the 
> current draft started, maybe we would be convinced. As it is, I don’t see the 
> point.
Not if TLS 1.2.1 is a subset of TLS 1.2, similar to the UTA profile.
In fact, that's what happened the last time this idea was raised: it
got kicked over to UTA.

>
> Yoav
>
>
>> On 12 Jan 2016, at 4:03 PM, Peter Gutmann <pgut...@cs.auckland.ac.nz> wrote:
>>
>> Martin's comment reminded me of the following that I've been meaning to
>> post...
>>
>> In a recent discussion among some crypto folks, the topic of what TLS 1.3
>> could be came up.  Now by TLS 1.3 I mean TLS 1.3 as a simple upgrade path 
>> from
>> TLS 1.2, not the TLS 2.0-called-TLS 1.3 that it currently is.  The discussion
>> centered around the fact that we already have lots of analysis done for TLS
>> 1.x, and it's not too hard to create a TLS 1.3 that fixes the TLS < 1.3
>> problems while being as compatible as possible with existing infrastructure.
>> So what this would do is take existing security analysis applied to TLS,
>> namely:
>>
>> Bhargavan et al, "Proving the TLS handshake secure (as is)".
>>
>> Brzuska et al, "Less is more: relaxed yet compatible security notions for key
>> exchange".
>>
>> Dowling et al, "Modelling ciphersuite and version negotiation in the TLS
>> protocol".
>>
>> Firing, "Analysis of the Transport Layer Security protocol".
>>
>> Gajek et al, "Universally Composable Security Analysis of TLS".
>>
>> Giesen et al, "On the security of TLS renegotiation".
>>
>> Jager et al, "On the security of TLS-DHE in the standard model".
>>
>> Krawczyk et al, "On the security of the TLS protocol".
>>
>> (and probably several more) and use them to simplify TLS 1.2 to create an
>> improved TLS that leverages about 15 years of analysis, rather than creating
>> what's almost a new protocol based on bleeding-edge/experimental ideas,
>> mechanisms, and algorithms.
>>
>> The discussion started out somewhat informally so by the time it got really
>> interesting it was too late to take notes, but I thought I'd try and recreate
>> the design points...
>>
>> - Drop 99% of all cipher suites, leaving one traditional one (DHE + AES-CBC +
>> HMAC-SHA2 + RSA-SHA2/PSK for auth) and one ECC one (ECDHE + AES-GCM + HMAC-
>> SHA2 + ECDSA-SHA2/PSK for auth) as must's (with a strong preference for OCB
>> instead of GCM as the AEAD if it were freely available).
>>
>> - For the non-AEAD cipher, use EtM not MtE (so effectively making it AEAD as
>> well).
>>
>> - Get rid of the IPsec cargo-cult MAC truncation.
>>
>> - For DHE, send the full set of parameters (X9.42), not p+g only (PKCS #3) to
>> allow verification (for those who don't have a copy of X9.42, it requires
>> the same verification steps as FIPS 186 does).  Also, mix the hash of the
>> DHE values into the computed premaster secret to protect against use of
>> manipulated curves.
>>
>> - RSA-PSS, not PKCS #1 (with a subset arguing for PKCS #1 with the sig-check
>> done as encode-then-compare, which fixes all known padding-manipulation
>> issues).
>>
>> - No compression or rehandshake.
>>
>> - Replace the PRF with HKDF?  (No pressing need for this, but it would be 
>> part
>> of the general cleanup).
>>
>> Longer discussion points:
>>
>> - The DHE/ECDHE parameters were a bit contentious.  For DHE the choice is
>> between server-specified ephemeral parameters and IETF-blessed fixed ones.
>> Arguments can be made either way, we had de facto IETF-blessed fixed DHE
>> params in the form of the RFC 2409 ones, but that wasn't such a good idea.
>> OTOH with ephemeral DHE params many implementations didn't check them, but
>> then the spec never required any checking (or much of anything at all in
>> regard to DHE use, which no doubt contributed to some of the dubious
>> practices that have been found in the wild).  The situation wasn't helped by
>> the use of the PKCS #3 representation, which the requirement to use the
>> X9.42 form alongside the accompanying checks attempts to address.
>>
>> - Similarly, for ECDHE the choice is between NIST and CFRG ones.  The CFRG
>> ones are obviously better (for various values of better, see endless debates
>> elsewhere), but some people will insist on only using something that's come
>> from NIST (I'll reserve my opinion on that one, and wouldn't dream of
>> stooping to phrases like "cargo cult protocol design"...).
>>
>> Peter.
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to