Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Thomas Pornin
On Thu, Mar 22, 2018 at 07:10:00PM +0200, Ilari Liusvaara wrote: > I think BearSSL processes messages chunk-by-chunk. I think it even can > process individual X.509 certificates chunk-by-chunk. That's correct. In fact, it can process a complete handshake, including the X.509 certificate chain, eve

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Ilari Liusvaara
On Thu, Mar 22, 2018 at 05:11:33PM +, Subodh Iyengar wrote: > Ya I think you have the right idea. The former attack is the one > that I'm more concerned about, i.e. compression libraries almost > always provide streaming interfaces. Another case is that TLS > implementations which are the users

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Subodh Iyengar
Former and latter is a horrible way to refer to attacks :) what I really meant is that when a receiver processing of timing of same TLS record chunks triggers a bug in the decompressor. Subodh From: TLS on behalf of Subodh Iyengar Sent: Thursday, March 22, 201

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Subodh Iyengar
Ya I think you have the right idea. The former attack is the one that I'm more concerned about, i.e. compression libraries almost always provide streaming interfaces. Another case is that TLS implementations which are the users of some decompression api might also provide the frames to the decom

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Ilari Liusvaara
On Thu, Mar 22, 2018 at 04:58:57PM +, David Benjamin wrote: > To make sure I understand the issue, the concern is that your decompression > function provides a chunk-by-chunk interface, there's a bug and the > division into chunks produces a different result? Or are you suggesting > that, with

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread David Benjamin
To make sure I understand the issue, the concern is that your decompression function provides a chunk-by-chunk interface, there's a bug and the division into chunks produces a different result? Or are you suggesting that, with the same chunking pattern, the result is still non-deterministic somehow

[TLS] potential attack on TLS cert compression

2018-03-22 Thread Subodh Iyengar
Antoine and I were discussing draft-ietf-tls-certificate-compression over lunch today and we think there could be a potential attack on the current scheme which could be fixed with some changes. Currently the CompressedCertificate is included in the handshake transcript.. However let's say a s

Re: [TLS] Additional changes for draft-ietf-tls-iana-registry-updates

2018-03-22 Thread Salz, Rich
I am inclined to agree with Peter. It doesn't quite seem like a registry if the very first time there is a list of things in it, that list is now frozen. Why are we closing/reserving all the bits? ___ TLS mailing list TLS@ietf.org https://www.ietf.o

Re: [TLS] Additional changes for draft-ietf-tls-iana-registry-updates

2018-03-22 Thread Sean Turner
> On Mar 22, 2018, at 10:10, Peter Gutmann wrote: > > Sean Turner writes: > >> I had a quick chat with the iANA folks about the HashAlgorithm and >> SignatureAlgorithm, which we are effectively closing by marking all >> unregistered bits as either reserved or depcreated. IANA suggested anothe

Re: [TLS] Additional changes for draft-ietf-tls-iana-registry-updates

2018-03-22 Thread Peter Gutmann
Sean Turner writes: >I had a quick chat with the iANA folks about the HashAlgorithm and >SignatureAlgorithm, which we are effectively closing by marking all >unregistered bits as either reserved or depcreated. IANA suggested another >way which is to just close the registry, This seems a bit of

Re: [TLS] Additional changes for draft-ietf-tls-iana-registry-updates

2018-03-22 Thread Sean Turner
I had a quick chat with the iANA folks about the HashAlgorithm and SignatureAlgorithm, which we are effectively closing by marking all unregistered bits as either reserved or depcreated. IANA suggested another way which is to just close the registry, An example for the registry follows:

Re: [TLS] Breaking into TLS to protect customers

2018-03-22 Thread Benjamin Kaduk
[Apparently this was stuck in my 'drafts' folder; sorry if it has since become stale...] On Mon, Mar 19, 2018 at 07:20:04AM -0700, Colm MacCárthaigh wrote: > It's true that breaking open cleartext runs counter to the mission of > end-to-end TLS, but it also seems like operators are going to do it