On Tue, Apr 18, 2017 at 4:44 PM, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:

> On Tue, Apr 18, 2017 at 03:51:53PM -0400, Eric Rescorla wrote:
> > On Tue, Apr 18, 2017 at 3:41 PM, Ilari Liusvaara <
> ilariliusva...@welho.com>
> > wrote:
> > >
> > > On topic of PSKs, I noticed that TLS 1.3 makes it very easy to mount
> > > dictionary attacks against PSK, regardless of DHE-PSK (especially to
> > > recover the client PSK). I assumed that the document already documents
> > > this, but I couldn't find any remark that using low-entropy PSKs is
> very
> > > bad idea.
> > >
> >
> > Good point. As far as I can tell...
> >
> > 1. You can search the binder.
> > 2. Because we forbid PSK with server authentication, you can also
> > impersonate the server and then mount a dictionary attack (even w/o the
> > binder).
>
> AFAICT, if I wanted to extract low-entropy client PSK, I wouldn't even
> bother with 2, since 1 seems so much more efficient (all passive too!)..
>

I agree. I just meant that if we were to dispense with the binder it would
still be trivial.

-Ekr


>
>
> Also, wonder if there are efficient ways of probing server PSKs (I
> didn't compe up with one, even in pure-PSK, due to binders making
> such probing nontrivial).
>
>
> -Ilari
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to