> On Dec 5, 2023, at 12:01 PM, Christian Huitema <huit...@huitema.net> wrote:
> 
> On 12/5/2023 8:13 AM, Russ Housley wrote:
>> At IETF 104, I presented a slide with informal reasoning about TLS 1.3 
>> Security.
>> Authentication:
>> The certificate processing is exactly the same. It is not better or worse.
>> Key Schedule computation of Early Secret:
>> – Initial Handshake
>>      Without extension: HKDF-Extract(0, 0)
>>      With extension: HKDF-Extract(ExternalPSK, 0)
>> – Subsequent Handshake No changes.
>> Conclusion: Any entropy contributed by the External PSK can only make the 
>> Early Secret better; the External PSK cannot make it worse.
> 
> That's true, but that's not the only point. Your introduction section argues 
> that adding entropy will enable resistance to quantum attacks.
> We assume that quantum attacks can break symmetric encryption using meet in 
> the middle algorithm, which means the "safe" size for a quantum resistant 
> symmetric key is probably 256 bits, not the commonly used 128.

Agreed.

> If the PSK is also used to encrypt early data, and if that PSK is not strong 
> enough, the quantum attacker will do a two steps: use the early data as an 
> oracle to break the PSK, then use the now discovered PSK to break the [EC]DH 
> + PSK combination.

The external PSK is inserted in the key schedule in the initial handshake.  The 
resumption PSK is used in subsequent handshakes.  So, I am missing something in 
your concern.

> At a minimum, this kind of consideration should be added to the security 
> section if we move this RFC to standards track.

I am pleased to add some text about the size of the external PSK.

Russ


> 
> -- Christian Huitema
> 
> 
>> I will be glad to work with someone that already has things set up for TLS 
>> 1.3 without this extension to do a more formal analysis.
>> Russ
>>> On Dec 3, 2023, at 5:00 PM, Eric Rescorla <e...@rtfm.com> wrote:
>>> 
>>> To respond directly to the call: I think we should require some level of 
>>> formal analysis for this kind of extension.
>>> 
>>> If there is some, I think the WG should look at it to determine whether 
>>> it's sufficient. If there isn't I think this should remain at experimental. 
>>> Not having a normative downref is not a good reason; those are trivial to 
>>> manage.
>>> 
>>> -Ekr
>>> 
>>> 
>>> On Sun, Dec 3, 2023 at 12:28 PM Deirdre Connolly <durumcrustu...@gmail.com 
>>> <mailto:durumcrustu...@gmail.com>> wrote:
>>>> Whoops wrong one, strike that
>>>> 
>>>> On Sun, Dec 3, 2023, 3:28 PM Deirdre Connolly <durumcrustu...@gmail.com 
>>>> <mailto:durumcrustu...@gmail.com>> wrote:
>>>>> At least one bit of work:
>>>>> https://dl.acm.org/doi/abs/10.1145/3548606.3559360
>>>>> 
>>>>> On Sun, Dec 3, 2023, 3:23 PM Eric Rescorla <e...@rtfm.com 
>>>>> <mailto:e...@rtfm.com>> wrote:
>>>>>> What do we have in terms of formal analysis for this extension?
>>>>>> 
>>>>>> -Ekr
>>>>>> 
>>>>>> 
>>>>>> On Fri, Dec 1, 2023 at 11:40 AM Russ Housley <hous...@vigilsec.com 
>>>>>> <mailto:hous...@vigilsec.com>> wrote:
>>>>>>> I think this should move forward.  I am encouraged that at least two 
>>>>>>> people have spoken to me about their implementations.
>>>>>>> 
>>>>>>> Russ
>>>>>>> 
>>>>>>>> On Nov 29, 2023, at 10:51 AM, Joseph Salowey <j...@salowey.net 
>>>>>>>> <mailto:j...@salowey.net>> wrote:
>>>>>>>> 
>>>>>>>> RFC 8773 (TLS 1.3 Extension for Certificate-Based Authentication with 
>>>>>>>> an External Pre-Shared Key) was originally published as experimental 
>>>>>>>> due to lack of implementations. As part of implementation work for the 
>>>>>>>> EMU workitem draft-ietf-emu-bootstrapped-tls which uses RFC 8773 there 
>>>>>>>> is ongoing implementation work. Since the implementation status of RFC 
>>>>>>>> 8773 is changing, this is a consensus call to move RFC 8773 to 
>>>>>>>> standards track as reflected in 
>>>>>>>> [RFC8773bis](https://datatracker.ietf.org/doc/draft-ietf-tls-8773bis). 
>>>>>>>> This will also help avoid downref for the EMU draft.  Please indicate 
>>>>>>>> if you approve of or object to this transition to standards track 
>>>>>>>> status by December 15, 2023.
>>>>>>>> 
>>>>>>>> Thanks,
>>>>>>>> 
>>>>>>>> Joe, Sean, and Deirdre
>>>>>>>> 
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/tls
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to