Ah, I understand your question now :-)

Sure, the document seems inconsistent/unclear about this at the moment.
Once we settle on a decision regarding FFDHE I'll fix this.

best,
Nimrod


On Fri, 3 Mar 2023 at 19:35, Eric Rescorla <e...@rtfm.com> wrote:

>
>
> On Fri, Mar 3, 2023 at 9:21 AM Nimrod Aviram <nimrod.avi...@gmail.com>
> wrote:
>
>> Hi Eric and Everyone, draft coauthor here.
>>
>> Appendix C lists "DHE Cipher Suites Refered to by This Document", not
>> ones which are deprecated.
>>
> The intention of the current text is to permit fully ephemeral DHE over a
>> finite field (FFDHE) with sufficient group size.
>>
>
> That's what I got from the title of Appendix CA, but then what does this
> text
> mean:
>
> "All the cipher suites that do not meet the above requirements are
>  listed in the table in Appendix C."
>
> Because, as you say, some of the suites in C meet this requirement.
>
>
>
>>
>> However, we also have an unresolved consensus call regarding whether/to
>> what extent to permit FFDHE when this document (hopefully) becomes an
>> official RFC:
>> https://mailarchive.ietf.org/arch/msg/tls/iZGV0kKHfbV5MrO-owB8mFwfffw/
>> so at any rate, the current text around FFDHE is mostly a placeholder.
>> I do hope to present at the upcoming WG meeting and resolve this issue,
>> which should be the last one (famous last words, I know).
>>
>> Happy to answer further questions, or generally get a discussion going on
>> here before the meeting.
>>
>
> OK, so we don't need to spend too much time on this, but I'd still like to
> understand
> the intent :)
>
> -Ekr
>
>
>>
>> best,
>> Nimrod
>>
>>
>>
>>
>> On Thu, 2 Mar 2023 at 23:19, Eric Rescorla <e...@rtfm.com> wrote:
>>
>>> Hi folks,
>>>
>>> I was just reading draft-ietf-tls-deprecate-obsolete-kex-01.txt
>>> and the combination of Section 3 and Appendix C is confusing
>>> to me.
>>>
>>> Specifically, the text says:
>>>
>>>    Clients and servers MAY offer fully ephemeral FFDHE cipher suites in
>>>    TLS 1.2 connections under the following conditions:
>>>
>>>    1.  Clients and servers MUST NOT reuse ephemeral DHE public keys
>>>        across TLS connections for all existing (and future) TLS
>>>        versions.  Doing so invalidates forward secrecy properties of
>>>        these connections.  For DHE, such reuse may also lead to
>>>        vulnerabilities such as those used in the [Raccoon] attack.  See
>>>        Section 6 for related discussion.
>>>
>>>    2.  The group size is at least 2048 bits.
>>>
>>>    ...
>>>
>>>    All the cipher suites that do not meet the above requirements are
>>>    listed in the table in Appendix C.
>>>
>>>
>>> And then Appendix C lists, for instance:
>>>
>>>    TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
>>>
>>> Which as I understand it, can be used with the above requirements
>>> as long as you use a suitable group, so this makes me think maybe
>>> I don't understand the text. What cipher suites is this intended
>>> to permit in TLS 1.2?
>>>
>>> -Ekr
>>>
>>>
>>>
>>> _______________________________________________
>>> TLS mailing list
>>> TLS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tls
>>>
>>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to