*   Where these interpretations conflict, the selection may be downgraded, 
potentially even under attacker influence.
Downgrade by attacker is only possible if the client attempts insecure fallback 
(e.g., offer PQ key share, connection failed, retry without PQ key share)?
Or am I missing some other possible downgrade attack?


  *   Clients that assume a server implements the new rules may introduce a 
downgrade attack on a pre-existing server.
From the text, it is not clear to me exactly how.

  *   It updates server behavior to clarify that key shares may not reflect 
client preferences.
  *   While this algorithm avoids HelloRetryRequest whenever possible, it 
implicitly assumes the client prefers the values sent in key_share, and that 
the server has no preferences between any groups.
I don’t think so.
Servers accepting other than the server’s top-priority group in order to avoid 
HRR aren’t necessarily doing this because they honor client preferences or 
assume that key_share reflects client preferences.
They may simply find several groups acceptable and consider RTT reduction more 
important than the strength difference between certain groups. I’m not 
convinced that this is necessarily wrong, generally.

Cheers,

Andrei

From: TLS <tls-boun...@ietf.org> On Behalf Of Rob Sayre
Sent: Monday, October 16, 2023 10:52 AM
To: David Benjamin <david...@chromium.org>
Cc: tls@ietf.org
Subject: [EXTERNAL] Re: [TLS] Fwd: New Version Notification for 
draft-davidben-tls-key-share-prediction-00.txt

On Mon, Oct 16, 2023 at 9:18 AM David Benjamin 
<david...@chromium.org<mailto:david...@chromium.org>> wrote:
 I've thus rephrased it in terms of just one group, which I think is much 
tidier. How does this look to you?
https://github.com/davidben/tls-key-share-prediction/commit/310fa7bbddd1fe0c81e3a6865a59880efc901b33

I agree with the sentiment, but I still see one problem. This text seems really 
tough to write, so I sympathize.

The only remaining problem I see is "Restricting to prediction-safe groups".

Maybe "Restricting this selection to..."? I don't have a strong opinion, but 
I'm pretty sure "Restricting to" is not right.

thanks,
Rob

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to