Re: [Cryptography] What TLS ciphersuites are still OK?

2013-09-11 Thread Yaron Sheffer

On 09/11/2013 12:54 PM, Alan Braggins wrote:

On 10/09/13 15:58, james hughes wrote:

On Sep 9, 2013, at 9:10 PM, Tony Arcieri basc...@gmail.com
mailto:basc...@gmail.com wrote:

On Mon, Sep 9, 2013 at 9:29 AM, Ben Laurie b...@links.org
mailto:b...@links.org wrote:

And the brief summary is: there's only one ciphersuite left that's
good, and unfortunately its only available in TLS 1.2:

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

A lot of people don't like GCM either ;)


Yes, GCM does have implementation sensitivities particularly around the
IV generation. That being said, the algorithm is better than most and
the implementation sensitivity obvious (don't ever reuse an IV).


I think the difficulty of getting a fast constant time implementation on
platforms without AES-NI type hardware support are more of a concern.


Is this any different from plain old AES-CBC?
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography


Re: [Cryptography] What TLS ciphersuites are still OK?

2013-09-10 Thread Yaron Sheffer

Hi Hanno,

Please send any comments on this draft to the TLS Working Group mailing 
list, t...@ietf.org.


Thanks,
Yaron

On 09/10/2013 12:14 AM, Hanno Böck wrote:

On Mon, 9 Sep 2013 17:29:24 +0100
Ben Laurie b...@links.org wrote:


Perry asked me to summarise the status of TLS a while back ...
luckily I don't have to because someone else has:

http://tools.ietf.org/html/draft-sheffer-tls-bcp-00

In short, I agree with that draft. And the brief summary is: there's
only one ciphersuite left that's good, and unfortunately its only
available in TLS 1.2:

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256


I don't really see from the document why the authors discourage
ECDHE-suites and AES-256. Both should be okay and we end up with four
suites:


[...]
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography


/dev/random and virtual systems

2010-08-02 Thread Yaron Sheffer

Hi,

the interesting thread on seeding and reseeding /dev/random did not 
mention that many of the most problematic systems in this respect are 
virtual machines. Such machines (when used for cloud computing) are 
not only servers, so have few sources of true and hard-to-observe 
entropy. Often the are cloned from snapshots of a single virtual 
machine, i.e. many VMs start life with one common RNG state, that 
doesn't even know that it's a clone.


In addition to the mitigations that were discussed on the list, such 
machines could benefit from seeding /dev/random (or periodically 
reseeding it) from the *host machine's* RNG. This is one thing that's 
guaranteed to be different between VM instances. So my question to the 
list: is this useful? Is this doable with popular systems (e.g. Linux 
running on VMWare or VirtualBox)? Is this actually being done?


Thanks,
Yaron

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com