On Wed, Feb 24, 2016 at 3:11 PM, Watson Ladd <watsonbl...@gmail.com> wrote:
> On Tue, Feb 23, 2016 at 7:39 PM, Hugo Krawczyk <h...@ee.technion.ac.il> > wrote: > > > > > > On Tue, Feb 23, 2016 at 8:57 PM, Dave Garrett <davemgarr...@gmail.com> > > wrote: > >> > >> On Tuesday, February 23, 2016 02:03:53 pm Martin Thomson wrote: > >> > I propose that we remove DH-based 0-RTT from TLS 1.3. > >> > > >> > As ekr's previous mail noted, the security properties of PSK-based > >> > 0-RTT and DH-based 0-RTT are almost identical. And DH-based 0-RTT is > >> > much more complex. > >> > > >> > For those who love DH-based 0-RTT, and I know that some people are > >> > fans, here's something that might make you less sad about removing it > >> > from the core spec. You can use DH out of band to negotiate a PSK. > >> > You might even do this as an extension to TLS, but that's of less > >> > value. > >> > >> I think there is a good argument for moving DH 0RTT into a TLS > extension. > >> Implementations that are explicitly not going to use it should not be > >> expected to implement it and risk screwing it up. If we accept that > premise > >> that online DH 0RTT will be unlikely in practice, then we would be > >> specifying it at least primarily for out-of-band use, and doing it via > an > >> extension will probably be cleaner and safer. > > > > > > Combining this comment (which I agree with) with the following comment > from > > Watson in another thread: > > > >> > > If they rely on extensions then either those > >> > > extensions need to be included in the security proofs, or we need to > >> > > make clear that they are not as secure as TLS 1.3, and that > >> > > implementations which enable both of them can get completely wrecked > >>in new and exciting ways. > > > > We get that even if it is decided not to include the DH-based 0-RTT as > part > > of mandatory-to-implement TLS 1.3, it should be defined as an extension > and > > as part of the TLS 1.3 document. Leaving the reduction from this case to > PSK > > (as Martin suggested) to popular imagination is too dangerous. By > including > > it as part of TLS 1.3 official text we also encourage the groups that are > > currently analyzing the protocol to include this specific mechanism in > their > > analysis. If they find something wrong with it then even more reason to > do > > the analysis. > > > > > >> > >> I would still prefer it be defined in the TLS 1.3 specification > document, > >> though optional. > > > > > > I suggest to also define TLS 1.3-EZ. > > A subset of core safe functionality that should address the majority of > the > > usage cases. > > I strongly encourage this proposal, and will even massacre the > markdown to attempt it. Great. Let's sync up as we get a little closer to done. I also commit to implementing TLS 1.3-EZ in > Go, and possibly in C based on Amazon's s2n. (A trustable X509 library > in C is still beyond my reach, so that C might be server-only). > I believe Richard Barnes has already started something along these lines, so maybe you guys could join forces (not sure how confident he is in it). https://github.com/bifurcation/mint This library currently interoperates with my experimental implementation in NSS. -Ekr > > > > Hugo > > > > > >> > >> > >> > >> Dave > >> > >> _______________________________________________ > >> TLS mailing list > >> TLS@ietf.org > >> https://www.ietf.org/mailman/listinfo/tls > > > > > > > > _______________________________________________ > > TLS mailing list > > TLS@ietf.org > > https://www.ietf.org/mailman/listinfo/tls > > > > > > -- > "Man is born free, but everywhere he is in chains". > --Rousseau. > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls