On Thu, Apr 13, 2017 at 09:29:27PM -0700, Joseph Salowey wrote:
> Hey Folks,
> 
> At the IETF 98 meeting in Chicago there was support in the room to adopt
> draft-sullivan-tls-exported-authenticator [0]. We are looking for feedback
> on adopting this draft form the list. Please respond if you support the
> draft and are willing to review it. If you object to its adoption, please
> let us know why. Please respond to the list by 20170501
> 

Looking at the draft and reviewing it:

- Section 1:

The section should also say a bit why not to use post-handshake
authentication. Which is not available at all for server, won't
work properly with multiplexed connections, etc...

- Section 2:

Probable typo: "encryped" (in last line of first paragraph on page 3).

- Section 2:

I think there should be "(for TLS 1.3)" after reference to the TLS 1.3
draft in definition of handshake context. Otherwise it will read oddly
after draft reference gets replaced by reference to the RFC.

- Section 2:

I think the finished MAC key length should always follow the PRF hash.
TLS 1.2 with EMS requires well-defined PRF hash anyway, and some cipher-
suites have SHA-1 as HMAC hash.

- Section 2

I think giving random number as example of request context is bad,
and one should instead give some sequence number (with possible gaps)
as example.

These things do not have to be random, and generating sequence
numbers in connection context is much easier than random numbers.

- Section 2:

The spec should be clear if message headers are included or not (the
hashes seem injective either way).

If message headers are included, perhaps wrap the context into
synthethic hash message like with first CH when retrying handshake in
TLS 1.3. One could even reuse the message type (#254).

- Section 4:

Nitpick: The framework is usually called SIGMA, not SIGMAC (reference). 

- Section 4:

The last two security considerations look pretty hard to understand,
and overly long.

As I understand it, those paragraphs mean something like:

----------------------
Authenticators are independent and unidirectional, and as consequence:

 * It is difficult to formally prove an endpoint is jointly
   authoritative over multiple certificates instead of individually
   authoritative over each.

 * There is no feedback on if authenticator was processed, at what
   point of connection it was processed nor if it was accepted. Any
   such feedback needs to be implemented at application layer.if
   required.
----------------------

(As note, the TLS-built-in authentication fails most of the second
part as well, for various reasons.


- Section 4:

Perhaps add consideration that this SHOULD be implemented inside TLS
library (or at least as an library), even if it is possible to implement
outside it.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to