John Mattsson writes: > ignoring the mandatory point validation Exactly! That's how the real world works. The NSA/NIST approach fills ECDH and signatures with traps for the implementors; implementors fall into the traps; the NSA/NIST responses sound like "This security failure is _your_ fault! Read Section 5.6.2.2.2.X.Y.Z.Z.Y of the documentation!"
Actual quote: "NIST is not aware of any vulnerabilities to attacks on these curves when they are implemented correctly and used as described in NIST standards and guidelines." Similar earlier quote from NSA: "We are unaware of any weaknesses in the DSS or in the DES when properly implemented and used for the purposes for which they both are designed." It's much more robust to tell implementors "Use X25519" and "Use Ed25519". We have a detailed analysis of how this reduces security risks. We also have real-world security observations following the predicted patterns. Of course, adding X25519 as MTI is just one step towards telling people not to touch the NSA-supplied footgun, but it's better than saying "Everything is fine, no action needed". > Dan, do you have any concrete example of TLS implementations using > P-256 without point validation? Yes. I already pointed to the list of security failures in Appendix A of https://cr.yp.to/papers.html#safecurves; some of the failures listed there are point-validation failures in TLS implementations. Furthermore, some of the other examples in the list are security failures in TLS implementations other than point-validation failures. See, e.g., the Firefox "CVE-2023-6135: NSS susceptible to 'Minerva' attack" announcement that I mentioned before. Does anyone know whether NIST claims that the NSA/NIST curves weren't "implemented correctly" in Firefox? Or that CVE-2023-6135 wasn't a vulnerability? Has there been _any_ response? "Everything is fine"? It's not as if people implementing NSA/NIST curves for TLS are in some radically different situation from people implementing NSA/NIST curves for other environments. The full spectrum of implementation failures is a bunch of dead canaries in the coal mine; asking "Did any miners die yet?" is the wrong question. We should be proactive about security. ---D. J. Bernstein _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org