there was a discussion of adding a statement that a fresh ephemeral key MUST be 
used for each session.  It was decided not to do that.  Without such a 
requirement, nonces are needed.

Russ


> On Jul 24, 2017, at 12:40 PM, Dan Brown <danibr...@blackberry.com> wrote:
> 
> Hmm, I'd appreciate a brief reminder* of why 1.3 needs nonces at all, given 
> that ephemeral DH is mandated, if anybody has the time/patience. (* ok, not 
> that I truly ever knew).
> 
> I assume that the risk of misusing the nonces, to exfiltrate keys etc, is 
> small enough compared to other side channels to justify their added value.
> 
> 
>  Original Message
> From: Stephen Farrell
> Sent: Monday, July 24, 2017 11:15 AM
> To: tls@ietf.org
> Subject: [TLS] 32 byte randoms in TLS1.3 hello's
> 
> 
> Hiya,
> 
> I'm guessing many folks interested in TLS may have been
> at the QUIC session in Prague and hence missed out on the
> excellent talk by Stephen Checkoway on the juniper dual-ec
> incident. (I highly recommend taking a peek at the slides [1]
> or reading the paper [2] or watching the video wherever
> that may be;-).
> 
> Anyway, in TLS1.3 we've gotten rid of the gmt time option
> in the client and server hello, which is good, (and I do
> recall that discussion) but we've also changed from:
> 
>   // RFC5246
>   struct {
>      uint32 gmt_unix_time;
>      opaque random_bytes[28];
>   } Random;
> 
> to:
> 
>   // tls1.3 -21
>   opaque Random[32];
> 
> Now if some TLS1.3 deployment were affected by a dual-ec
> attack, it'd seem like the -21 version of Random might be
> even better than the TLS1.2 version, for the attacker.
> 
> I tried to see where that 28->32 change came from but
> didn't find it (apologies if I missed that). I guess it
> just ensures that the overall length of the struct is
> the same.
> 
> So, a question and a possible suggestion:
> 
> Q: Why do we need 32 bytes of Random?
> 
> Suggestion: if we don't need that much, maybe we could
> change the length there, (I can see that might trigger
> bugs and middlebox issues) or encourage/require folks
> to mask out some of those bits (e.g. with zeros or some
> catchy hex encoded message about dual-ec:-).
> 
> Cheers,
> S.
> 
> 
> [1]
> https://www.ietf.org/proceedings/99/slides/slides-99-irtfopen-anrp-stephen-checkoway-a-systematic-analysis-of-the-juniper-dual-ec-incident-00.pdf
> [2] https://web.eecs.utk.edu/~mschucha/netsec/readings/p468-checkoway.pdf
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to