Hi Rich,

I think static DH, or reusing ephemerals, has always been a weak point of TLS 
implementations: e.g. if you don’t validate the peer’s public value, you may 
leak your (reusable) private value. In principle, if implemented correctly, 
static DH can be ok if you don’t care about forward secrecy, but TLS 1.2 also 
did this weird thing of truncating the result of DH to strip leading zeroes, 
which leads to this attack. Retiring static DH and forbidding ephemeral key 
reuse in TLS 1.2 seems like the safest way forward.

Note that TLS 1.3 does not truncate the result of DH, and neither does 
draft-green-tls-static-dh-in-tls13, and both (should) ask for peer keys to be 
validated, so these issues should not apply to TLS 1.3 implementations (unless 
they are buggy.)

-Karthik




> On 9 Sep 2020, at 17:04, Salz, Rich <rsalz=40akamai....@dmarc.ietf.org> wrote:
> 
> https://raccoon-attack.com/
>  
> Do we need a short RFC saying “do not use static DH” ?
>  
> I am probably not the only one thinking fondly of 
> draft-green-tls-static-dh-in-tls13 now.
>  
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to