On 12/5/2023 10:56 AM, Russ Housley wrote:


On Dec 5, 2023, at 12:01 PM, Christian Huitema <huit...@huitema.net> wrote:

On 12/5/2023 8:13 AM, Russ Housley wrote:
At IETF 104, I presented a slide with informal reasoning about TLS 1.3 Security.
Authentication:
The certificate processing is exactly the same. It is not better or worse.
Key Schedule computation of Early Secret:
– Initial Handshake
        Without extension: HKDF-Extract(0, 0)
        With extension: HKDF-Extract(ExternalPSK, 0)
– Subsequent Handshake No changes.
Conclusion: Any entropy contributed by the External PSK can only make the Early 
Secret better; the External PSK cannot make it worse.

That's true, but that's not the only point. Your introduction section argues 
that adding entropy will enable resistance to quantum attacks.
We assume that quantum attacks can break symmetric encryption using meet in the middle 
algorithm, which means the "safe" size for a quantum resistant symmetric key is 
probably 256 bits, not the commonly used 128.

Agreed.

If the PSK is also used to encrypt early data, and if that PSK is not strong 
enough, the quantum attacker will do a two steps: use the early data as an 
oracle to break the PSK, then use the now discovered PSK to break the [EC]DH + 
PSK combination.

The external PSK is inserted in the key schedule in the initial handshake.  The 
resumption PSK is used in subsequent handshakes.  So, I am missing something in 
your concern.

Yes. Both are used to compute the "early secret" -- external PSK for the initial handshake, resumption PSK in subsequent handshakes. If the secrets are "short" and the attacker can use early data as some kind of oracle, then the attacker can probably crack the PSK for the initial handshake, or the resumption PSK in subsequent handshakes. If the PSK is cracked, it probably does not add much effective entropy to the key computed via the [EC]DH + PSK combination.


At a minimum, this kind of consideration should be added to the security 
section if we move this RFC to standards track.

I am pleased to add some text about the size of the external PSK.

Thanks. I am not 100% sure that we actually have an attack against the [EC]DH+PSK combination, but I am confident than if the PSK secret is weak, the attacker can get to the early data. If only for that, it is prudent to use long enough PSK.

-- Christian Huitema


Russ



-- Christian Huitema


I will be glad to work with someone that already has things set up for TLS 1.3 
without this extension to do a more formal analysis.
Russ
On Dec 3, 2023, at 5:00 PM, Eric Rescorla <e...@rtfm.com> wrote:

To respond directly to the call: I think we should require some level of formal 
analysis for this kind of extension.

If there is some, I think the WG should look at it to determine whether it's 
sufficient. If there isn't I think this should remain at experimental. Not 
having a normative downref is not a good reason; those are trivial to manage.

-Ekr


On Sun, Dec 3, 2023 at 12:28 PM Deirdre Connolly <durumcrustu...@gmail.com 
<mailto:durumcrustu...@gmail.com>> wrote:
Whoops wrong one, strike that

On Sun, Dec 3, 2023, 3:28 PM Deirdre Connolly <durumcrustu...@gmail.com 
<mailto:durumcrustu...@gmail.com>> wrote:
At least one bit of work:
https://dl.acm.org/doi/abs/10.1145/3548606.3559360

On Sun, Dec 3, 2023, 3:23 PM Eric Rescorla <e...@rtfm.com 
<mailto:e...@rtfm.com>> wrote:
What do we have in terms of formal analysis for this extension?

-Ekr


On Fri, Dec 1, 2023 at 11:40 AM Russ Housley <hous...@vigilsec.com 
<mailto:hous...@vigilsec.com>> wrote:
I think this should move forward.  I am encouraged that at least two people 
have spoken to me about their implementations.

Russ

On Nov 29, 2023, at 10:51 AM, Joseph Salowey <j...@salowey.net 
<mailto:j...@salowey.net>> wrote:

RFC 8773 (TLS 1.3 Extension for Certificate-Based Authentication with an 
External Pre-Shared Key) was originally published as experimental due to lack 
of implementations. As part of implementation work for the EMU workitem 
draft-ietf-emu-bootstrapped-tls which uses RFC 8773 there is ongoing 
implementation work. Since the implementation status of RFC 8773 is changing, 
this is a consensus call to move RFC 8773 to standards track as reflected in 
[RFC8773bis](https://datatracker.ietf.org/doc/draft-ietf-tls-8773bis). This 
will also help avoid downref for the EMU draft.  Please indicate if you approve 
of or object to this transition to standards track status by December 15, 2023.

Thanks,

Joe, Sean, and Deirdre

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to