On Jul 23, 2017, at 15:37, Ted Lemon <mel...@fugue.com> wrote:
> On Jul 23, 2017, at 12:05 PM, Blumenthal, Uri - 0553 - MITLL <u...@ll.mit.edu 
> <mailto:u...@ll.mit.edu>> wrote:
>> I think there's no way the connection can be established if the third party 
>> in control of the network does not allow that. 
> 
> This is why it’s hard to reason well about this stuff—we tend to get the 
> threat models wrong.   The attack that negotiating enables is not that a 
> third party can block all connections. They can always block all connections. 
> What the attack enables is blocking only those connections that don’t 
> negotiate a downgrade. So if you negotiate a downgrade, you get to look at 
> your content, but if you don’t negotiate the downgrade, you don’t. This 
> allows a MiTM to coerce end users into negotiating downgrades.

That is clear and AFAIK unavoidable. And not my (main) concern.

What I am trying to avoid is the ability to *surreptitiously* subvert a 
protocol that’s assumed to be secure. IMHO it is fine if one end-point is faced 
with a choice of either agreeing to an “eavesdropping” connection or aborting 
because of no (remaining) common cipher-suites. What I don’t want to see is one 
end negotiating a connection that “should” be secure based on the exchange 
parameters, but in fact leaking keys… What I want in such a case is a 
negotiation that clearly states what has been done. Then the end-point would 
make a conscious decision to either connect and access data despite being 
surveilled, or avoid both surveillance and service.

> Of course the far end can just not downgrade, but it may have downgrading 
> enabled either for debugging purposes, never intending that all connections 
> be downgraded, or because the operator didn’t configure the server correctly. 
>  

My main concern is the “invisible” downgrade (that the operator has no say 
about), not an operator error.

> If it’s not in the standard, it can still be enabled by operators who are 
> violating the end user’s trust, but won’t happen by accident and won’t be 
> possible to coerce with a MiTM attack. 

I see your point. I don’t share your concern, but don’t object to it either.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to