On Mon, Aug 20, 2018 at 7:46 PM Geoffrey Keating <geo...@geoffk.org> wrote:

> "Nancy Cam-Winget \(ncamwing\)" <ncamwing=40cisco....@dmarc.ietf.org>
> writes:
>
> > In following the new IANA rules, we have posted the draft
> > https://tools.ietf.org/html/draft-camwinget-tls-ts13-macciphersuites-00
> > to document request for registrations of HMAC based cipher
> > selections with TLS 1.3…..and are soliciting feedback from the WG on
> > the draft and its path forward.
>
> This draft needs more security analysis than is currently there, and
> probably it needs to define not just a ciphersuite but an entire
> profile for using TLS with this ciphersuite.  Some topics:
>
> * Anything that relies on EncryptedExtensions should probably not be
> used.
>
> * The session ticket properties change in the absence of encryption.  In
> existing TLS 1.3, they are sent only after Finished and so are
> encrypted; now they are public.  I am not sure if this changes the
> security model but it definitely makes it easier to attack the ticket.
>
> * A less-obvious consequence to the lack of confidentality is that a
> typical implementation, an attacker can selectively block messages
> knowing their contents (by breaking the connection).  In the weather
> example this might be used to manipulate average daily temperature by
> blocking only higher or only lower readings.  In the robot example
> this might be used to cause it to exceed its limits by allowing
> movement commands only in one direction.
>
> I wonder whether it's really helpful to call the result 'TLS' and
> not something else?
>

I'm agnostic w.r.t. confidentiality of application data -- we've
historically been bad at making decision about what does / does not need to
be confidential, but hey, it's your data.

However, the EE / NST arguments Geoff make here seem pretty compelling to
me.  They indicate to me that if a mechanism is defined where application
data is not encrypted, records that contain non-application data still need
to be encrypted.  That of course blows away the "code footprint" argument,
and it's not trivial to implement given how the application_data content
type has been overloaded in 1.3.

ISTM that in order to do this at all elegantly, you'd have to abandon using
application_data records for application data, since those have to be
encrypted for the above reasons), and instead either:

- Use a different record type (say plaintext_data)
- Use a different protocol that can be muxed with TLS (as with DTLS-SRTP)

Unfortunately the former approach would require a Standards Action.  So
maybe the latter is the way to go.

--Richard


>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to