Oh, sure.  In a similar vein, an attacker can also probe for which
identities are known to the server.

https://github.com/bifurcation/tls-pake/commit/0e72bd5244e89970fe61e5434ca7df3d769d057c


On Mon, Apr 16, 2018 at 3:06 PM, Jonathan Hoyland <
jonathan.hoyl...@gmail.com> wrote:

> You are, but it's not mentioned in the security section.
> As it's a security consideration that you don't get in vanilla TLS I feel
> that it should be mentioned.
>
> Regards,
>
> Jonathan
>
>
> On Mon, 16 Apr 2018 at 20:01 Richard Barnes <r...@ipv.sx> wrote:
>
>> That's correct, however if I have a guess of the password can I not just
>>> try and connect using that password?
>>> If my guess is correct then the connection will succeed, whereas if my
>>> guess is incorrect then the connection will fail.
>>>
>>
>> Sure, but aren't you going to have that with any password-authenticated
>> protocol?
>>
>> --Richard
>>
>>
>>
>>> I'm assuming here that the salt is public, because salts in general do
>>> not have confidentiality guarantees (otherwise they stretch the metaphor
>>> and become pepper).
>>> (I also assume that the client identity can be derived from observing a
>>> previous session, and that the server identity can be identified through
>>> probing.)
>>>
>>> Regards,
>>>
>>> Jonathan
>>>
>>>
>>>
>>> On Mon, 16 Apr 2018 at 19:43 Richard Barnes <r...@ipv.sx> wrote:
>>>
>>>> Hey Jonathan,
>>>>
>>>> Thanks for the comments.  I've implemented them in my working copy of
>>>> the draft, and in my implementation in mint.  I have also changed it over
>>>> to use SPAKE2+; I agree with Tony that this is necessary to guard against
>>>> server compromise.
>>>>
>>>> https://github.com/bifurcation/tls-pake/commit/
>>>> a9f097c3bfe43cf50001e1a340c7e2e693850d4b
>>>> https://github.com/bifurcation/mint/pull/193
>>>>
>>>> With regard to security properties: I don't think it's correct that an
>>>> active attacker can do online password guessing.  Everything that is
>>>> revealed on the wire is blinded with fresh, per-connection entropy, and
>>>> thus doesn't reveal anything about the password.
>>>>
>>>> --Richard
>>>>
>>>>
>>>> On Mon, Apr 16, 2018 at 7:52 AM, Jonathan Hoyland <
>>>> jonathan.hoyl...@gmail.com> wrote:
>>>>
>>>>> Hi Richard,
>>>>>
>>>>> A few nits.
>>>>>
>>>>> * In the introduction you have the sentence
>>>>> > DISCLAIMER: This is a work-in-progress draft of MLS and has not yet
>>>>>
>>>>>    seen significant security analysis.
>>>>>
>>>>> Iiuc this draft has no connection to MLS, and this is a typo.
>>>>>
>>>>>  * In the setup you define
>>>>>
>>>>> > o  A DH group "G" of order "p*h", with "p" a large prime
>>>>>
>>>>> and
>>>>>
>>>>> > o  A password "p"
>>>>>
>>>>>
>>>>> The variable "p" has two different meanings, which is a bit confusing,
>>>>> especially later on.
>>>>>
>>>>>  * The document doesn't explicitly state that X and Y need to be
>>>>> non-zero.
>>>>> The requirement is in "I-D.irtf-cfrg-spake2", but it would be nice if
>>>>> the warning was carried through.
>>>>>
>>>>> * In terms of security properties, iiuc an active adversary can do
>>>>> online password guessing attacks, but a passive adversary cannot derive 
>>>>> the
>>>>> password from observing the messages. If that is the case perhaps a 
>>>>> warning
>>>>> about rate-limiting connection attempts is appropriate.
>>>>>
>>>>> Regards,
>>>>>
>>>>> Jonathan
>>>>>
>>>>> On Mon, 16 Apr 2018 at 10:50 Tony Putman <tony.put...@dyson.com>
>>>>> wrote:
>>>>>
>>>>>> Hi Richard,
>>>>>>
>>>>>> I don't think that you can protect against server compromise with
>>>>>> SPAKE2. The server can store w*N as you suggest, but it also has to store
>>>>>> w*M because it must calculate y*(T-w*M). An attacker that learns w*M and
>>>>>> w*N from a compromised server can then impersonate a client.
>>>>>>
>>>>>> The rest of your comments I agree with (though they are not all
>>>>>> addressed in the updated draft).
>>>>>>
>>>>>> Tony
>>>>>>
>>>>>> > From: Richard Barnes [mailto:r...@ipv.sx]
>>>>>> > Sent: 13 April 2018 19:50
>>>>>> >
>>>>>> > Hey Tony,
>>>>>> >
>>>>>> > Thanks for the comments.  Hopefully we can adapt this document to
>>>>>> tick more boxes for you :)
>>>>>> > Since I had noticed some other errors in the document (e.g.,
>>>>>> figures not rendering properly),
>>>>>> > I went ahead and submitted a new version that takes these comments
>>>>>> into account.
>>>>>> >
>>>>>> > https://tools.ietf.org/html/draft-barnes-tls-pake-01
>>>>>> >
>>>>>> > Some responses inline below.
>>>>>>
>>>>>> Dyson Technology Limited, company number 01959090, Tetbury Hill,
>>>>>> Malmesbury, SN16 0RP, UK.
>>>>>> This message is intended solely for the addressee and may contain
>>>>>> confidential information. If you have received this message in error,
>>>>>> please immediately and permanently delete it, and do not use, copy or
>>>>>> disclose the information contained in this message or in any attachment.
>>>>>> Dyson may monitor email traffic data and content for security &
>>>>>> training.
>>>>>> _______________________________________________
>>>>>> TLS mailing list
>>>>>> TLS@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/tls
>>>>>>
>>>>>
>>>>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to