On Thu, Mar 8, 2018 at 9:41 AM, Tony Putman <tony.put...@dyson.com> wrote:

> Hi Ekr,
>
>
>
> Firstly, thanks for this. My primary reason for putting together
> draft-putman was to propose a handshake exchange which only uses a single
> asymmetric algorithm. If this proposal is extended to include raw public
> keys (I think these are already supported, but not mentioned in the text)
> and an ECDH-based MAC for client authentication, then this satisfies my
> constraints.
>

Yep, that should actually work just fine.


As a single data point, I can state that some of the IoT products that I'm
> working with already use static ECDH keys for client authentication (though
> not within TLS).
>



>
>
> Although OPTLS is able to use 0-RTT, I don't see how this capability could
> be used in this implementation, even if the client knows the server static
> key. Because SS is only included in the key schedule when the master secret
> is generated, the client_early_traffic_secret has no input secret.
> Conversely, if the SS is included in the key schedule as the PSK, then the
> certificate cannot be decrypted by a client which does not have the server
> static key.
>

Yes, I agree with you. OPTLS had a less linear key schedule. I think if you
wanted to do 0-RTT you would have to have it be a pretend PSK as you
suggest in your draft.


I think that this and draft-putman are not competing, but rather that they
> serve different use case
>

Agreed. It sounds like you have a set of use cases where you know how to
predistribute the server key? This is the part we found challenging int he
web context.

-Ekr





> s. They could be synergistic, such that this draft provides a mechanism
> for distributing a static key which could later be used in a draft-putman
> exchange; however, the natural continuation would be to use a resumption
> PSK, so this would only be useful if there were a long gap between session,
> which seems unlikely.
>
>
>
> Regards,
>
> Tony
>
>
>
> *From:* TLS [mailto:tls-boun...@ietf.org] *On Behalf Of *Christopher Wood
> *Sent:* 07 March 2018 01:26
> *To:* <tls@ietf.org>; Eric Rescorla
> *Subject:* Re: [TLS] Semi-Static Diffie-Hellman Key Establishment for TLS
> 1.3
>
>
>
> Thanks for putting this together! I’m in favor of the mechanism and look
> forward to discussing it. Negotiating with signature_algorithms is a simple
> way to roll this out, it fits in cleanly with the key schedule, and the
> benefits outlined in the introduction (PRNG hardening, plausible
> deniability, etc.) seem worth the effort. Although the approach has its
> roots in OPTLS, we will certainly need to re-assess its impact on the
> handshake. (I know of some folks actively working on this.) We also need to
> spend more time thinking about the open issues — specifically, the story
> around early data encryption. This variant has the benefit of enabling
> early data with public key encryption, as opposed to (trackable) symmetric
> key encryption. It’s unclear to me whether or not we need to address the
> static share publication issue for this benefit.
>
>
>
> Anyway, thanks again for the draft. I’ll read it carefully before London.
>
>
> Best,
>
> Chris
>
>
> On Mar 5, 2018, 4:14 PM -0500, Eric Rescorla <e...@rtfm.com>, wrote:
>
> Hi folks,
>
>
>
> Here's another entry in the DH-only pile.
>
>
>
> I've just posted:
>
>    draft-rescorla-tls13-semistatic-dh-00
>
>
>
> This implements a semi-static DH exchange mostly borrowed from
>
> OPTLS [0]. There are obviously connections with draft-putman, but
>
> this is more oriented towards implementing a 1-RTT style
>
> exchange where the client has no foreknowledge of the server's
>
> capabilities (though it's extensible to 0-RTT) than towards
>
> pre-distributed DH keys, and has less invasive changes to the
>
> key schedule.
>
>
>
> We'd like 10 minutes to discuss this in London.
>
>
>
> Thanks,
>
> -Ekr
>
>
>
> [0] http://ieeexplore.ieee.org/abstract/document/7467348/
>
>
>
>
>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
> Dyson Technology Limited, company number 01959090, Tetbury Hill,
> Malmesbury, SN16 0RP, UK.
> This message is intended solely for the addressee and may contain
> confidential information. If you have received this message in error,
> please immediately and permanently delete it, and do not use, copy or
> disclose the information contained in this message or in any attachment.
> Dyson may monitor email traffic data and content for security & training.
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to