Thanks!
The PR is here, happy to hear comments and corrections:
https://github.com/dstebila/draft-ietf-tls-hybrid-design/pull/1

best,
Nimrod


On Fri, 18 Sep 2020 at 12:04, Nimrod Aviram <nimrod.avi...@gmail.com> wrote:

> Sounds good to me.
> I'm happy to send a PR making these changes, but couldn't find the
> repository for the document.
> Could you please point me to it?
>
> best,
> Nimrod
>
>
> On Thu, 17 Sep 2020 at 17:12, Douglas Stebila <doug...@stebila.ca> wrote:
>
>> Given that all the finalists and alternate candidates have fixed
>> length shared secrets, and your observations on the potential for
>> timing attacks, I'm fine with dealing with only fixed length secrets,
>> removing the paragraph discussing the possibility for variable-length
>> shared secrets from the TLS 1.3 hybrid KEX draft, and adding a note
>> regarding the risks as identified by the Raccoon attack.
>>
>> Douglas
>>
>>
>> On Wed, Sep 16, 2020 at 12:27 PM Nimrod Aviram <nimrod.avi...@gmail.com>
>> wrote:
>> >
>> > Dear all,
>> >
>> > We are writing to ask about the possible security impact of
>> > variable-length secrets on the "Hybrid key exchange in TLS 1.3" RFC
>> > [1].
>> >
>> > As you probably know, when using key material of variable length
>> > and processing this material using hash functions, a timing side
>> > channel may arise. In broad terms, when the secret is longer, the hash
>> > function may need to process more blocks internally. In some unfortunate
>> > circumstances, this has led to timing attacks, e.g. Lucky Thirteen [2]
>> > and the newly-disclosed Raccoon Attack [3]. To be clear, we are not
>> > aware of any attack on the proposed standard. Rather, we view this as
>> > an opportunity to defend-in-depth against such attacks, while work on
>> > the standard is in progress.
>> >
>> > Our proposal is to add language to the RFC explaining that
>> variable-length
>> > secrets may enable such attacks, and should therefore be avoided when
>> > possible.  Currently, the language seems to allow for variable-length
>> > secrets, should the need arise:
>> > "Variable-length shared secrets ... if it is envisioned that this
>> specification
>> > be used with algorithms which do not have fixed-length shared secrets
>> ..."
>> >
>> > We also note that a related RFC exists, "Hybrid Post-Quantum Key
>> > Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2"
>> > [4]. However, that RFC apparently only uses BIKE, Kyber or SIKE as the
>> > PQ KEM. To our knowledge, all three KEMs have fixed-length secrets. It
>> > may be prudent to add cautionary language to that document as well,
>> > in case other KEMs are used in the future.
>> >
>> > Kind regards,
>> > The Raccoon Team
>> >
>> > [1]
>> https://www.ietf.org/id/draft-ietf-tls-hybrid-design-00.html#name-open-questions
>> > [2] https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6547131
>> > [3] https://raccoon-attack.com/
>> > [4]
>> https://tools.ietf.org/id/draft-campagna-tls-bike-sike-hybrid-05.html#name-key-exchange-algorithms
>> >
>> >
>> > _______________________________________________
>> > TLS mailing list
>> > TLS@ietf.org
>> > https://www.ietf.org/mailman/listinfo/tls
>>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to