Re: [TLS] Abridged Certificate Compression

2023-08-14 Thread Phillip Hallam-Baker
Looks like a slippery slope to me. Hang on, I will get my skis.

If you are going to do this, you might as well go the whole hog and provide
a mechanism that allows the client to say if it already has a cert on file
for that particular host, e.g. by means of a digest.

Another approach to consider is one in which there are two certs, an ECDH
cert that is updated very frequently (e.g. daily) and a longer expiry PQC
cert). So the big cert only needs to be transmitted infrequently.

Security has different dimensions, we made a lot of compromises in the
1990s because work factor and administrative convenience were at odds. We
knew RSA1024 was marginal for a start. With modern machines and ECC, most
of those limits have been erased and we started to think differently. PQC
forces us to rethink some of that because the certs are not going to fit
into a packet.

Systems with low work factors are insecure but the same is true of systems
that are too difficult to maintain. ACME assists of course. But we have to
be aware that achieving an acceptable quantum work factor may result in
designs that are compromised relative to where we were headed with
ECC/ACME/etc.


Bottom line is that we should not reject hybrid solutions. While we have
PQC algorithms that provide a work factor we are fairly confident of, the
constraints they impose on architecture are significant. So a long lived (1
year) Kyber key paired with a short lived (24 hr) cert for an X.448 key.

I think we should also be open to architectures in which we publish an
X25519/X448 key in the DNS which is ot the HOST, not the service and use
that to provide confidentiality for the service key exchange which is PQC.

At the end of the day, the risk someone builds a quantum computer in the
next 10 years is real but rather small, these are physics experiments, not
computing devices. The risk that we screw up the Internet cryptographic
infrastructure by insisting on crypto-perfectionism is probably much higher.


When public key arrived, a lot of people got the mistaken idea symmetric
crypto was obsolete. It took Dorothy Demming pointing out that the use of a
session key/digest in RSA is actually for security and not just an
efficiency hack. Perhaps we should approach PQC in the same spirit.



On Thu, Jul 6, 2023 at 6:18 PM Dennis Jackson  wrote:

> Hi all,
>
> I've submitted the draft below that describes a new TLS certificate
> compression scheme that I'm calling 'Abridged Certs' for now. The aim is
> to deliver excellent compression for existing classical certificate
> chains and smooth the transition to PQ certificate chains by eliminating
> the root and intermediate certificates from the bytes on the wire. It
> uses a shared dictionary constructed from the CA certificates listed in
> the CCADB [1] and the associated extensions used in end entity
> certificates.
>
> Abridged Certs compresses the median certificate chain from ~4000 to
> ~1000 bytes based on a sample from the Tranco Top 100k. This beats
> traditional TLS certificate compression which produces a median of ~3200
> bytes when used alone and ~1400 bytes when combined with the outright
> removal of CA certificates from the certificate chain. The draft
> includes a more detailed evaluation.
>
> There were a few other key considerations. This draft doesn't impact
> trust decisions, require trust in the certificates in the shared
> dictionary or involve extra error handling. Nor does the draft favor
> popular CAs or websites due to the construction of the shared
> dictionary. Finally, most browsers already ship with a complete list of
> trusted intermediate and root certificates that this draft reuses to
> reduce the client storage footprint to a few kilobytes.
>
> I would love to get feedback from the working group on whether the draft
> is worth developing further.
>
> For those interested, a few issues are tagged DISCUSS in the body of the
> draft, including arrangements for deploying new versions with updated
> dictionaries and the tradeoff between equitable CA treatment and the
> disk space required on servers (currently 3MB).
>
> Best,
> Dennis
>
> [1] Mozilla operates the Common CA Database on behalf of Apple,
> Microsoft, Google and other members.
>
> On 06/07/2023 23:11, internet-dra...@ietf.org wrote:
> > A new version of I-D, draft-jackson-tls-cert-abridge-00.txt
> > has been successfully submitted by Dennis Jackson and posted to the
> > IETF repository.
> >
> > Name: draft-jackson-tls-cert-abridge
> > Revision: 00
> > Title:Abridged Compression for WebPKI Certificates
> > Document date:2023-07-06
> > Group:Individual Submission
> > Pages:19
> > URL:
> https://www.ietf.org/archive/id/draft-jackson-tls-cert-abridge-00.txt
> > Status:
> https://datatracker.ietf.org/doc/draft-jackson-tls-cert-abridge/
> > Html:
> https://www.ietf.org/archive/id/draft-jackson-tls-cert-abridge-00.html
> > Htmlized:
> 

Re: [TLS] RFC7924 (Cached Information Extension) Update for TLS 1.3

2023-08-14 Thread Thom Wiggers
Hi Simon,

Op za 12 aug 2023 om 16:00 schreef Simon Mangel :

> Note: We have already found an adaption for TLS 1.3 in academic work
> [Schwabe2021], where instead of caching the whole chain, each
> certificate is cached separately.
> This however leads to inconsistent signaling, as there is no
> differentiation between a choice of cached certificate chains and
> separately cached certificates of a single chain.
>
> As the author, I want to clarify that the variant that we made was
optimized for least-effort, and you are probably correct in that there are
better ways to do it.

Also, as the author of the AuthKEM proposal, the stored-public-key
mechanism of which also originates in [Schwabe2021], I should obviously
plug that draft here as well :-) (Expect an updated version soon*)*

Cheers,

Thom


[Schwabe2021] More Efficient Post-quantum KEMTLS with Pre-distributed
> Public Keys, https://doi.org/10.1007/978-3-030-88418-5_1
> https://thomwiggers.nl/publication/kemtlspdk/
>
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] RFC7924 (Cached Information Extension) Update for TLS 1.3

2023-08-14 Thread Dennis Jackson

Hi Simon,

Can you expand more on the intended use case? When would it make sense 
to use a RFC7924-like mechanism over TLS 1.3's session resumption?


I skimmed RFC 7924 and session resumption seems strictly better as it's 
already widely deployed, allows for the DH handshake to be optionally 
elided and has the exact same storage requirements (some space required 
on the client, none required on the server).


Best,
Dennis

On 12/08/2023 06:58, Simon Mangel wrote:

tl;dr: We plan on updating RFC 7924 for TLS 1.3 and would like to check
whether there is interest in the TLS wg.

The TLS Cached Information extension [RFC7924] has not seen significant
adoption since its specification.
However, we still believe it to be an interesting candidate in upcoming
IoT application scenarios.


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls