On Thu, Feb 27, 2020, at 1:31 PM, David Benjamin wrote:
> On Mon, Feb 24, 2020 at 5:58 PM Jonathan Hoyland 
> <jonathan.hoyl...@gmail.com> wrote:
> > This would be for cases where we want to inject extra context into a 
> > resumption. 
> > That would be anything that changes an authentication property, so for 
> > example if you wanted to include some agreement on the status of a 
> > post-handshake auth or Exported Authenticator.
> > 
> > So for example imagine I had a session during which I received an EA and 
> > when I came to resume that session I wished to indicate that I was still 
> > willing to accept the EA.
> > I would offer a special PSK and inject some extra material into the 
> > handshake*, and if the server was able / willing to agree to this it would 
> > select the PSK. 
> > I could also offer a PSK with no extra injected material, as a fallback, 
> > and request the EA again. 
> > 
> > * This would only affect the binder for the PSK in the ClientHello. 
> 
> I'm still not following. If you're resuming, this is a PSK issued from 
> a NewSessionTicket, in which case this isn't an imported PSK at all. 
> It's a resumption PSK and uses "res binder". If we needed to negotiate 
> variations on a resumption, this importer mechanism wouldn't give us a 
> way to express that anyway. I expect we'd instead lean on some 
> combination of multiple tickets, NewSessionTicket extensions, and plain 
> ClientHello extensions. But maybe I'm still not understanding the 
> scenario.
> > Another potential use would be the binding for ECHO, although I don't have 
> > a clear enough picture of the precise mechanics of that to know if it would 
> > be helpful.
> 
> Chris is probably more up-to-date here, but I don't believe the current 
> ECHO design looks like a funny PSK.

That's right -- it's just another extension in the outer CH. 

Best,
Chriss

> > Something that would allow for a consistent naming in the future would be 
> > my preference, because just as "imp binder" doesn't preclude "imp r 
> > binder", using "imp e binder" doesn't preclude us never adopting "imp r 
> > binder".
> > I vaguely remember discussing whether the longer name would tip us into an 
> > extra hash invocation at the last IETF, and concluding that it didn't, 
> > although I'd have to double check that. 
> 
> Of course. Yeah, I think the more pertinent question is whether "imp r 
> binder" is actually a thing.
> > Regards,
> > 
> > Jonathan 
> > 
> > On Mon, 24 Feb 2020, 22:23 David Benjamin, <david...@chromium.org> wrote:
> >> On Mon, Feb 24, 2020 at 4:33 PM Jonathan Hoyland 
> >> <jonathan.hoyl...@gmail.com> wrote:
> >>> Just looking at this again, it might be better to make a slightly 
> >>> different tweak to the key schedule.
> >>> Instead of:
> >>>                 0
>                 |
>                 v
>       PSK ->  HKDF-Extract = Early Secret
>                 |
>                 +-----> Derive-Secret(., "ext binder"
>                 |                      | "res binder"
>                 |                      | "imp binder", "")
>                 |                     = binder_key                v
> >>> 
> >>> We should do:
> >>> 
> >>>                 0
>                 |
>                 v
>       PSK ->  HKDF-Extract = Early Secret
>                 |
>                 +-----> Derive-Secret(., "ext binder"
>                 |                      | "res binder"
>                 |                      | "imp e binder"                
> |                      | "imp r binder", "")
>                 |                     = binder_key                v
> >>> or at least:
> >>>                 0
>                 |
>                 v
>       PSK ->  HKDF-Extract = Early Secret
>                 |
>                 +-----> Derive-Secret(., "ext binder"
>                 |                      | "res binder"
>                 |                      | "imp e binder", "")
>                 |                     = binder_key                v
> >>> 
> >>> 
> >>> Just so that we can distinguish between external imported binders and 
> >>> resumed imported binders, should we at some point decide to do both. 
> >> 
> >> I may just be confused, but what would a resumed imported binder mean? I 
> >> see this mechanism as largely a bugfix for TLS 1.3 external PSKs, rather 
> >> than a new kind of adjective describing PSKs.
> >> 
> >> ("imp binder" also doesn't preclude "imp r binder" later if we later 
> >> define something which needs it, but I'm confused what the concept even 
> >> would be.)
> >> 
> >> David
> >>> On Mon, 24 Feb 2020 at 20:50, Christopher Wood <c...@heapingbits.net> 
> >>> wrote:
> >>>> On Fri, Feb 21, 2020, at 1:15 PM, Rob Sayre wrote:
> >>>>  > 
> >>>>  > 
> >>>>  > On Fri, Feb 21, 2020 at 8:35 AM Eric Rescorla <e...@rtfm.com> wrote:
> >>>>  > > 
> >>>>  > > 
> >>>>  > > On Thu, Feb 20, 2020 at 7:08 PM Rob Sayre <say...@gmail.com> wrote:
> >>>>  > >> Hi,
> >>>>  > >> 
> >>>>  > >> I'm not sure how violations of these requirements would result in 
> >>>> poor interoperability:
> >>>>  > >> 
> >>>>  > >> Clients which import external keys TLS MUST NOT use these keys for
> >>>>  > >> any other purpose. Moreover, each external PSK MUST be associated
> >>>>  > >> with at most one hash function.
> >>>>  > >> 
> >>>>  > >> These seem like aspirational security goals. It would be better to 
> >>>> describe the consequences of violating these conditions.
> >>>>  > > 
> >>>>  > > I don't agree. They are requirements in order to be able to make 
> >>>> the assertions we want to make about the security of the protocol.
> >>>>  > > 
> >>>>  > > This is consistent with the following text of RFC 2119 S 6
> >>>>  > > ".. or to limit behavior which has potential for causing harm 
> >>>> (e.g., limiting retransmisssions) "
> >>>>  > > 
> >>>>  > > I don't think it would be unreasonable.to explain the reason for 
> >>>> these, though this is already a requirement of 8446 S 4.2.11 (though 
> >>>> without justification).
> >>>>  > 
> >>>>  > I think that interpretation of 2119 is a stretch, but your idea to 
> >>>> add 
> >>>>  > an explanation while keeping the 2119 terms addresses my concern. At 
> >>>>  > the very least, the draft should note this is already a requirement 
> >>>> of 
> >>>>  > 8446.
> >>>> 
> >>>>  That seems perfectly reasonable! We can point to the security 
> >>>> considerations to clarify the "single hash function" requirement, and we 
> >>>> can note cross protocol attack deterrence for the other claim. Would 
> >>>> that suffice? If not, can you please recommend text?
> >>>> 
> >>>>  Thanks,
> >>>>  Chris
> >>>> 
> >>>>  _______________________________________________
> >>>>  TLS mailing list
> >>>> TLS@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/tls
> >>>  _______________________________________________
> >>>  TLS mailing list
> >>> TLS@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to