Again, responding to old emails...

> -----Original Message-----
> From: TLS <tls-boun...@ietf.org> On Behalf Of Stephen Farrell
> Sent: Friday, April 29, 2022 8:25 PM
> To: TLS@ietf.org
> Subject: Re: [TLS] WGLC for draft-ietf-tls-hybrid-design
> 
> - section 2: if "classic" DH were broken, and we then depend on a PQ-KEM,
> doesn't that re-introduce all the problems seen with duplicating RSA private
> keys in middleboxes? If not, why not? If so, I don't recall that discussion in
> the WG (and we had many mega-threads on RSA as abused by MITM folks so
> there has to be stuff to be said;-)

Actually, unless the client uses a PQ-KEM private key permanently, no one can 
do a MITM.  It is similar to Diffie-Hellman; the client picks a key share; the 
server picks a response key share; the both derive the same shared secret.

The draft allows (but does not encourage) the reuse of KEM private values (and 
while it must limit the reuse to what the specification of the KEM allows, in 
practice, that's not a restriction).  Should we modify the draft to forbid 
reuse?  Kyber public/private key generation is fast enough to make this 
practical.

Looking through the TLS 1.3 RFC, I don’t see any text addressing the reuse of 
ECDHE private values; is that implicit by the definition of DHE?  I do see in 
the text "If fresh (EC)DHE keys are used for each connection, then the output 
keys are forward secret."; that wording would imply the possibility of not 
using a fresh (EC)DHE key for each exchange...

> 
> - similar to the above: if PQ KEM public values are like RSA public keys, how
> does the client know what value to use in the initial, basic 1-RTT 
> ClientHello?
> (sorry if that's a dim question:-) If the answer is to use something like a 
> ticket
> (for a 2nd connection) then that should be defined here I'd say, if it were to
> use yet another SVCB field that also ought be defined (or at least hinted 
> at:-)

Actually, it's the client that selects the KEM public key.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to