Kenny, Would you have a problem with doing as Karthik suggests and generating separate traffic and handshake keys but at the same time?
-Ekr On Sat, Feb 20, 2016 at 11:58 AM, Paterson, Kenny <kenny.pater...@rhul.ac.uk > wrote: > Hi > > My 2c below... > > On 20/02/2016 18:53, "TLS on behalf of Cedric Fournet" > <tls-boun...@ietf.org on behalf of four...@microsoft.com> wrote: > > > > > >Besides, in our analysis of the handshake, we get precisely the same > >“fresh, never-used secret” property you are advocating, with or > > without the simplification, each time the handshake provides keys to the > >record layer. These points are well-specified and delimited. They just do > >not coincide with the end of the handshake. So I don’t see any > >fundamental difference in term of generic-security. > > > >We are left with scenarios whereby the record layer, given both the > >handshake and application-data traffic keys, somehow leaks only > > one of the two. I don’t mind keeping the key change if someone is > >concerned about it. > > Like Hugo, I am also concerned about removing the key change. Let me try > to explain why. > > I would emphasise the point that while we *can* provide formal security > analyses in the situation where the application key is used during the > handshake itself, it is made significantly more complex. > > In particular, it means we cannot simply combine security results arising > from separate analyses of the Handshake Protocol and of the Record > Protocol to obtain security guarantees for the composition of these two > protocols. So for example, if we chose to refine our modelling of the > Record Protocol in some way, then we would need to re-do the analysis of > TLS (Handshake + Record Protocols) as a monolithic effort. That's hard > work and error prone. This situation would not arise if the application > keys were NOT used in the handshake. > > This is not merely a conjectured issue. As one example, several papers > (including [1,2]) in the "provable security" paradigm have used the ACCE > framework as a security model within which to conduct analysis of > fragments of previous versions of TLS. ACCE was specifically designed to > deal with keys that are used across the Handshake and the Record > protocols. But ACCE views the Record Protocol in a particular way - > essentially as a stateful encryption scheme that processes "atomic" > messages. This modelling does not take into full account the streaming > nature of the TLS Record Protocol - in fact, what the Record Protocol > actually guarantees is significantly different from what is implied by the > ACCE modelling of it - see [3] for details, and also the cookie cutter > attack from the Triple Handshakes paper for an example of what can go > wrong. > > One implication of this is that the results of [1,2] for existing versions > of TLS really need to be reworked in a modified version of the ACCE > framework that better reflects the streaming nature of the Record > Protocol. That need for rework would have been avoided had TLS not used > application keys in the Handshake Protocol, because the compositional > guarantees would have enabled us to "plug and play" with our results. > > The same pertains in TLS 1.3 going forward: keeping the strict key > separation - no use of the application keys in the Handshake - will make > future - and on-going - analyses of TLS 1.3 easier. This is > notwithstanding the fact that several research teams, including Cedric's > and [1,2] below, have managed to produce analyses that do handle the use > of the application key in the Handshake. > > Regards, > > Kenny > > [1] Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk. On the > Security of TLS-DHE in the Standard Model. CRYPTO 2012. > [2] Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee. On the Security of > the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013. > [3] Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. > Paterson: Data Is a Stream: Security of Stream-Based Channels. CRYPTO (2) > 2015. > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls