On Thu, Mar 15, 2018 at 12:25:38PM +0100, Hubert Kario wrote:
> On Wednesday, 14 March 2018 21:13:29 CET Benjamin Kaduk wrote:
> > On Wed, Mar 14, 2018 at 12:46:25PM +0100, Hubert Kario wrote:
> > > On Wednesday, 14 March 2018 03:02:10 CET Benjamin Kaduk wrote:
> > > > It seems like we get ourselves in trouble by allowing multiple
> > > > external PSKs to be present.  If we allowed at most one external
> > > > PSK in a given ClientHello, then aborting the handshake on binder
> > > > failure would be the correct choice, as discovering a valid identity
> > > > would require discovering a valid key/password as well.
> > > 
> > > but identity/binder may be invalid only because the server was restarted
> > > and generated a new in-memory key; we don't want to abort connection in
> > > such
> > For an external PSK?  That hardly sounds like "external" to me...
> 
> not my fault that what we called just "PSK"s in TLS 1.2 is now "external 
> PSKs" 
> in TLS 1.3... I wanted to be unambiguous, so please, can we discuss the 
> issue, 
> not semiotics?

Sure!  (I still don't see how an ephemeral in-server key would be
used as/with an external PSK.)

> > > situation, continuing to a regular handshake is necessary then for good
> > > user experience (and likely, even security, given the history of TLS
> > > version fallbacks)
> > > 
> > > > Disallowing multiple external PSKs would make migration scenarios a
> > > > little more annoying, but perhaps not fatally so.
> > > 
> > > not only migration, but session resumption and regular PSK at the same
> > > time
> > > too - for session resumption you may not do DH, while for initial
> > > handshake
> > > with PSK you may want to to gain PFS...
> > > 
> > > so as tempting as the removal of multiple PSKs from ClientHello is, I'm
> > > afraid the fallout is far too large to do it
> > 
> > I did not say removal of multiple PSKs, rather removal of multiple
> > *external* PSKs.
> 
> we do not have a reliable mechanism of differentiating between external and 
> resumption PSKs while parsing Client Hello

Well, a valid external PSK (identity) the server will of course
recognize, and we have a SHOULD-level requirement that the
obfuscated_ticket_age is zero for external PSKs.  I haven't gotten
to think through whether there is still potential for information
leakage about external PSK identities, but it seems like there would
not be, provided that the server prefers resumption to external-PSK
full handshakes.

-Benjamin

Attachment: signature.asc
Description: PGP signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to