Hi Hanno,

We have done tests on this and it there is a difference.  For some industries 
(industrial automation) throughput is very sensitive so what might appear as a 
small difference can actually be quite significant.  On that same note, yes you 
are absolutely correct that the asymmetric handshake is far more 
computationally expensive.  However, this generally happens at the start of a 
connection where timing is less sensitive.  Once the application I/O is 
actually being sent/received is when the performance really becomes sensitive. 

Point taken that the ciphersuites could be used within an application where it 
isn't appropriate, however this would have to be weighed against the benefit of 
industries adopting TLS 1.3 and securing the many IoT applications that desire 
this.  This probably goes without saying but of course the best line of defense 
is to properly design, build, and configure the implementation.  I recognize 
that doesn't completely obviate your point but it does seem relevant.

Thanks,

--Jack

-----Original Message-----
From: TLS <tls-boun...@ietf.org> On Behalf Of Hanno Böck
Sent: Tuesday, February 26, 2019 4:04 PM
To: tls@ietf.org
Subject: EXTERNAL: Re: [TLS] Authentication Only Ciphersuites RFC

[Use caution with links & attachments]



I think I have raised my concerns before, but I have serious doubts there's 
real need for such ciphersuites.

The reasoning seems to be that performance constrained devices are unable to do 
"normal" TLS. I don't have benchmarks, but it's my experience that people 
vastly overestimate the costs of symmetric encryption operations (by far the 
largest computational cost of TLS is the asymmetric handshake). I wonder if the 
people who believe they need an authentication only ciphersuite ever ran tests.

I also see a non-neglegible risk in standardizing such ciphersuites.
Some implementations will end up adding them and coupled with implementation 
flaws we may end up in a situation where inadvertently insecure ciphersuites 
are chosen.

--
Hanno Böck
https://hboeck.de/

mail/jabber: ha...@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to