On Mon, Jul 18, 2016 at 3:06 AM, Dan Harkins <dhark...@lounge.org> wrote:
>
>   Hi Robert,
>
>   This draft moves the NamedCurve/EllipticCurveList into the
> ClientHello, and since the client sends X1 and ZKP(X1) in the
> ClientHello it means that is going to be a list of 1. It basically
> moves the client's key exchange portion from ClientKeyExchange into
> ClientHello. So basically, if a client wants to do TLS-ECJ-PAKE
> then that's the only thing it can offer and the parameters of
> that exchange are all selected by the client, not the server.
>
>   This is a fundamental change to TLS. If it's going to be offered,
> it's the only thing that can be offered and therefore the only thing
> that can be used. Seems like for a deployment either it's never used
> or it's the only thing used and that makes it sort of a proprietary
> protocol, not TLS.

This stems from the multiple rounds used in JPAKE. SPAKE2 uses only 2
rounds, and would be easier to put into TLS. I'm still working on the
draft, but haven't gotten to it in a while.

Sincerely,
Watson
>
>   Dan.
>
> On Thu, June 16, 2016 2:51 am, Robert Cragie wrote:
>> I would like to ask the working group for comments on the TLS-ECJ-PAKE
>> draft:
>>
>> https://tools.ietf.org/html/draft-cragie-tls-ecjpake-00
>>
>> Some brief notes:
>>
>> * This intended status is informational.
>> * The draft is based on TLS/DTLS 1.2 as the Thread group required basis on
>> existing RFCs wherever possible. For that reason and due to the WGs focus
>> on TLS 1.3, I have understood from the chairs that it would not have
>> received a great deal of attention from the WG, hence the intended status
>> of informational.
>> * The draft reflects the current use of the TLS_ECJPAKE_WITH_AES_128_CCM_8
>> cipher suite in Thread (http://threadgroup.org/).
>> * There is an experimental implementation in mbed TLS (
>> https://github.com/ARMmbed/mbedtls)
>> * The Thread group would like to get IANA assignments for 4 cipher suite
>> values and one ExtensionType value as soon as possible.
>> * There are at least four independent implementations, which have been
>> used
>> in interop. testing over the last 18 months.
>> * The security considerations recommend restriction of the use of this
>> cipher suite to Thread and similar applications and recommends it should
>> not be used with web browsers and servers (mainly due to the long
>> discussions regarding the use of PAKEs on this and other mailing lists).
>>
>> Robert
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
>>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to