Hiya,

On 03/09/2019 18:58, Richard Barnes wrote:
> Finally, to Stephen's question of analysis -- This doesn't affect the DTLS
> analysis.  All that's being done here is that another value is being
> encrypted with the keys from the DTLS handshake.  In that regard, it's like
> any other application protocol.  In the current approach, where we use a
> different handshake type, it is true that the EKTKey messages are fed into
> the DTLS transcript hash, which could affect future keys.  But this
> shouldn't allow any undue influence on those future keys, because unless
> the hash function has a preimage attack, an attacker can't choose a
> malicious input that leads to a particular value.

Thanks. However, we're previously seen unexpected comments
from people who do such analyses (e.g. "if you did it <this
other way> it'd be easier to analyse"), so personally I'd
prefer we still had that kind of analyst do that kind of
analysis.

I think there's real value in not lowering the bar for
TLS changes like this, and this does still smell like that
to me.

Cheers,
S.

Attachment: 0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to