On 12/5/2023 8:13 AM, Russ Housley wrote:
At IETF 104, I presented a slide with informal reasoning about TLS 1.3 Security.

Authentication:
The certificate processing is exactly the same. It is not better or worse.

Key Schedule computation of Early Secret:

– Initial Handshake
        Without extension: HKDF-Extract(0, 0)
        With extension: HKDF-Extract(ExternalPSK, 0)

– Subsequent Handshake No changes.

Conclusion: Any entropy contributed by the External PSK can only make the Early 
Secret better; the External PSK cannot make it worse.

That's true, but that's not the only point. Your introduction section argues that adding entropy will enable resistance to quantum attacks. We assume that quantum attacks can break symmetric encryption using meet in the middle algorithm, which means the "safe" size for a quantum resistant symmetric key is probably 256 bits, not the commonly used 128.

If the PSK is also used to encrypt early data, and if that PSK is not strong enough, the quantum attacker will do a two steps: use the early data as an oracle to break the PSK, then use the now discovered PSK to break the [EC]DH + PSK combination.

At a minimum, this kind of consideration should be added to the security section if we move this RFC to standards track.

-- Christian Huitema



I will be glad to work with someone that already has things set up for TLS 1.3 
without this extension to do a more formal analysis.

Russ


On Dec 3, 2023, at 5:00 PM, Eric Rescorla <e...@rtfm.com> wrote:

To respond directly to the call: I think we should require some level of formal 
analysis for this kind of extension.

If there is some, I think the WG should look at it to determine whether it's 
sufficient. If there isn't I think this should remain at experimental. Not 
having a normative downref is not a good reason; those are trivial to manage.

-Ekr


On Sun, Dec 3, 2023 at 12:28 PM Deirdre Connolly <durumcrustu...@gmail.com 
<mailto:durumcrustu...@gmail.com>> wrote:
Whoops wrong one, strike that

On Sun, Dec 3, 2023, 3:28 PM Deirdre Connolly <durumcrustu...@gmail.com 
<mailto:durumcrustu...@gmail.com>> wrote:
At least one bit of work:
https://dl.acm.org/doi/abs/10.1145/3548606.3559360

On Sun, Dec 3, 2023, 3:23 PM Eric Rescorla <e...@rtfm.com 
<mailto:e...@rtfm.com>> wrote:
What do we have in terms of formal analysis for this extension?

-Ekr


On Fri, Dec 1, 2023 at 11:40 AM Russ Housley <hous...@vigilsec.com 
<mailto:hous...@vigilsec.com>> wrote:
I think this should move forward.  I am encouraged that at least two people 
have spoken to me about their implementations.

Russ

On Nov 29, 2023, at 10:51 AM, Joseph Salowey <j...@salowey.net 
<mailto:j...@salowey.net>> wrote:

RFC 8773 (TLS 1.3 Extension for Certificate-Based Authentication with an 
External Pre-Shared Key) was originally published as experimental due to lack 
of implementations. As part of implementation work for the EMU workitem 
draft-ietf-emu-bootstrapped-tls which uses RFC 8773 there is ongoing 
implementation work. Since the implementation status of RFC 8773 is changing, 
this is a consensus call to move RFC 8773 to standards track as reflected in 
[RFC8773bis](https://datatracker.ietf.org/doc/draft-ietf-tls-8773bis). This 
will also help avoid downref for the EMU draft.  Please indicate if you approve 
of or object to this transition to standards track status by December 15, 2023.

Thanks,

Joe, Sean, and Deirdre




_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to