Hi, My understanding is that the updated version should not introduce any profile. Am I correct ?
BR, Daniel On Mon, Oct 17, 2016 at 1:16 PM, Daniel Migault <daniel.miga...@ericsson.com > wrote: > Hi, > > I am not very clear on how to update the text of the draft. The problem > seems to me that code point restriction are hard to implement. As a result, > the session is aborted with - insufficient_security(71) or equivalent - > when the code point does not match the security strength. I am encline to > think that we should also provide some profiles that achieve 128/256 bit > security. These profiles may be described in this document or in another > document more related to cryptographic recommendation. What would be the > most appropriated way to move forward ? > > BR, > Daniel > > > > On Sun, Oct 9, 2016 at 2:59 AM, John Mattsson <john.matts...@ericsson.com> > wrote: > >> Hi Dan, Sean, Nikos, >> >> First, let me state that I think requiring 128-bit key management for >> AES-128 is quite reasonable. >> >> HTTP/2 [RFC7540] also has some related text in Section 9.2.1 that applies >> when TLS is used for HTTP/2. "Endpoints MAY treat negotiation of key sizes >> smaller than the lower limits as a connection error (Section 5.4.1 >> <https://tools.ietf.org/html/rfc7540#section-5.4.1>) of type >> INADEQUATE_SECURITY." >> >> >> I think this is a question for TLS in general, >> draft-ietf-tls-ecdhe-psk-aead should just follow what the TLS WG decides >> as the general way forward. Wether that is MAY/SHOULD/SHALL treat groups >> with insufficient security as an error. >> >> I think the real problem here are TLS libraries supporting 1024 MODP and >> 160 ECC at all, support for these should have been removed before 2010. >> Nikos [0] recommends a RCF forbidding weak elliptic curves from TLS 1.2 >> (i.e. WeakDH DieDieDie!!!). I think this is a great idea and much better >> than bundling it into a code-point assignment RFC. (My current plans for >> the next update of 3GPP’s TLS and DTLS profiles is simply to forbid >> support of anything weaker than 2048 MODP and 255-bit ECC). >> >> [0]. https://mailarchive.ietf.org/arch/msg/tls/4PZsc_Dy-aT299BYrl >> BKvZs0BOQ >> >> >> >> Cheers, >> John >> >> >> On 11/07/16 22:26, "TLS on behalf of Dan Harkins" <tls-boun...@ietf.org >> on >> behalf of dhark...@lounge.org> wrote: >> >> > >> > I'm glad I have to opportunity to make you happy Sean :-) >> > >> >On Mon, July 11, 2016 7:40 am, Sean Turner wrote: >> >> I think I can take this bit: >> >> >> >> On Jul 10, 2016, at 06:51, Peter Dettman >> >><peter.dett...@bouncycastle.org> >> >> wrote: >> >>> >> >>> I'm also curious whether there is a precedent in other RFCs for an >> >>> explicit minimum curve bits, or perhaps a de facto implementer's rule? >> >> >> >> I'd be happy to be wrong here. but to my knowledge no there's not been >> >> an explicit minimum for curve bits. There have however been similar >> (at >> >> least in my non-cryptographer mind) for RSA key sizes so if we wanted >> to >> >> define an explicit minimum curve bits then we could. >> > >> > draft-ietf-tls-pwd-07 includes a RECOMMENDED practice of ensuring >> >the curves used provide commensurate strength with the ciphersuite >> >negotiated. Section 10, "Implementation Considerations", says: >> > >> > It is RECOMMENDED that implementations take note of the strength >> > estimates of particular groups and to select a ciphersuite providing >> > commensurate security with its hash and encryption algorithms. A >> > ciphersuite whose encryption algorithm has a keylength less than the >> > strength estimate, or whose hash algorithm has a blocksize that is >> > less than twice the strength estimate SHOULD NOT be used. >> > >> > And I would like to take this opportunity to remind everyone that >> >the only difference between TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256 >> >and TLS_ECCPWD_WITH_AES_128_GCM_SHA256 is that the latter is resistant >> >to dictionary attack and the former is not. >> > >> > regards, >> > >> > Dan. >> > >> > >> > >> >_______________________________________________ >> >TLS mailing list >> >TLS@ietf.org >> >https://www.ietf.org/mailman/listinfo/tls >> >> _______________________________________________ >> TLS mailing list >> TLS@ietf.org >> https://www.ietf.org/mailman/listinfo/tls >> > >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls