Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?

2023-11-08 Thread Dan Brown
Agreeing on security gains from hybrid. Should TLS ask CFRG (again?) what to do about PQC? > From: D. J. Bernstein > > Yoav Nir writes: > > To justify a hybrid key exchange you need people who are both worried > > about quantum computers and worried about cryptanalysis or the new > > algorithm

Re: [TLS] New Version Notification for draft-mattsson-tls-compact-ecc-00.txt

2023-01-17 Thread Dan Brown
Hi John and Scott, For even greater clarity, you might want to address these points: If the receiver uses an x-only ladder (e.g. Brier-Joye) and re-uses private ECC key, then, upon decoding the peer’s compress public key (represented via x), the receiver ought to check that x^3+ax+b is a

Re: [TLS] Combining Secrets in Hybrid Key Exchange in TLS 1.3

2021-09-02 Thread Dan Brown
Dear Nimrod and team: How does your concern compare to Campagna and Petcher’s report https://eprint.iacr.org/2020/1364 which has security proofs for concatenation-based KDF? (Maybe a detailed discussion is better suited to CFRG?) Best regards, ​Dan From: TLS On Behalf Of Nimrod Avira

[TLS] FYI, a subverted implementation attack against TLS at ia.cr/2020/1452

2021-08-25 Thread Dan Brown
re-used ephemeral keys). Best regards, ​ Dan Brown -- This transmission (including any attachments) may contain confidential information, privileged material (including material protected by the solicitor-client or other app

Re: [TLS] Adoption call for Deprecating FFDH(E) Ciphersuites in TLS

2021-08-17 Thread Dan Brown
Deprecating non-forward-secure ECDH and FFDH is important. Keeping FFDHE may be okay, e.g. for those who want forward security, but still don't trust ECC. -- This transmission (including any attachments) may contain confidential

Re: [TLS] Advancing draft-ietf-tls-hybrid-design

2021-08-05 Thread Dan Brown
> -Original Message- > From: TLS On Behalf Of Douglas Stebila > We wanted to see if there is any further feedback on our draft "Hybrid key > exchange in TLS 1.3" ... We have not received any new feedback from the working group > since we posted our last non-trivial update in October 2020.

Re: [TLS] Advancing draft-ietf-tls-hybrid-design

2021-07-13 Thread Dan Brown
Hi Douglas, Your general approach paves the way for improved forward security, as insurance against new attacks, a non-negligible risk (*). So, the TLS WG should advance it soon. Sorry, that I've not yet looked at the details, but I trust that your I-D is good. Best regards, Dan PS (*) The

Re: [TLS] DH generator 2 problem?

2020-10-09 Thread Dan Brown
Dear Michael, Your concern that special primes in Diffie--Hellman might be weaker has some truth: the famous and ingenious special number field sieve (SNFS) works against primes with special structure. See https://eprint.iacr.org/2016/961 for a recent application (which, as an extra wrinkle, is

Re: [TLS] Static DH timing attack

2020-09-10 Thread Dan Brown
From: TLS On Behalf Of Salz, Rich > Do we need a short RFC saying “do not use static DH” ? Don’t TLS 0-RTT and ESNI/ECH via HPKE use a type of (semi)static ECDH? If so, then an RFC to ban static (EC)DH in TLS would need to be very clear about not referring to these use cases of static ECDH.

Re: [TLS] [Cfrg] NIST crypto group and HKDF (and therefore TLS 1.3)

2020-05-12 Thread Dan Brown
Hi Hugo, Some curious molehill questions. Please take with a grain of salt. In short, does HKDF-Extract suffer from related-salt and repeated-IKM? To elaborate: Phillip raises a good point below about HMAC suffering from key-extension (by zero bytes). You are right that this is no

Re: [TLS] NIST crypto group and HKDF (and therefore TLS 1.3)

2020-05-08 Thread Dan Brown
> -Original Message- > From: Salz, Rich > > >[DB] But NIST Draft SP 800-56Cr2 cites RFC 5869, which is HKDF, and > > says > HKDF > is a version of 56C Section 5.1. So, I had thought that 56C would allow > HKDF. > What am I missing? > > It cites it, but doesn't include it in

Re: [TLS] NIST crypto group and HKDF (and therefore TLS 1.3)

2020-05-08 Thread Dan Brown
> -Original Message- > From: Cfrg On Behalf Of Salz, Rich > Subject: [Cfrg] NIST crypto group and HKDF (and therefore TLS 1.3) > > NIST SP 800-56C (Recommendation for Key-Derivation Methods in Key- > Establishment Schemes) is currently a draft in review with a deadline of > May 15.

Re: [TLS] Call for Adoption: draft-stebila-tls-hybrid-design

2020-02-24 Thread Dan Brown
use weaker crypto, to stop improving crypto. Best regards, ​ Dan Brown BlackBerry From: TLS On Behalf Of Joseph Salowey Sent: Thursday, February 13, 2020 12:13 PM To: Subject: [TLS] Call for Adoption: draft-stebila-tls-hybrid-design The authors of "Hybrid Key Exchange&quo

Re: [TLS] Ecdsa-sig-value in TLS 1.3 – need for erratum?

2019-10-01 Thread Dan Brown
??? Is it possible to do better with a non-extensible syntax? The only breakdown is the old syntax parsers receiving the extensions, right? That's the only place a lax parser would help.   Original Message   From: Peter Gutmann Sent: Tuesday, October 1, 2019 6:15 PM To: Hubert Kario; Dan Bro

Re: [TLS] (question on ANSI X9.62-2005) Re: Ecdsa-sig-value in TLS 1.3 – need for erratum?

2019-10-01 Thread Dan Brown
r that you are more baffled about all this than I am? 5. Yes, “revival” is my term, and in no way an official, so it’s sensible to quote me on it. Dan From: Rene Struik Sent: Tuesday, October 1, 2019 9:29 AM To: Dan Brown ; John Mattsson ; Peter Gutmann ; Hubert Kario ; TLS@ie

Re: [TLS] Ecdsa-sig-value in TLS 1.3 – need for erratum?

2019-10-01 Thread Dan Brown
> -Original Message- > From: John Mattsson > > Dan Brown wrote: > > > ANSI X9.62-2005 was withdrawn in 2015 > > Ok, that TLS 1.3 is relying on a withdrawn publication that used to be > behind a > paywall is even worse. [DB] Have mercy on TLS: I expec

Re: [TLS] Ecdsa-sig-value in TLS 1.3 – need for erratum?

2019-10-01 Thread Dan Brown
Re ECDSA specs and paywells: ANSI X9.62-2005 was withdrawn in 2015, expiring automatically after 10 years, despite my weak effort. A revival, ANSI X9.142, with almost the same content is under way, though even its fate is unsure. Also, I expect FIPS 186-5 is nearly ready, and will specify much of

Re: [TLS] Ecdsa-sig-value in TLS 1.3 – need for erratum?

2019-09-30 Thread Dan Brown
A brief reminder below about 2 new extra elements of ECDSA-Sig-Value. > -Original Message- > From: TLS On Behalf Of Hubert Kario > Sent: Monday, September 30, 2019 8:56 AM > > At the same time SEC 1 v2.0[1] defines that structure as follows: > >ECDSA-Sig-Value ::= SEQUENC

[TLS] Question about client impersonation... was Re: ETSI releases standards for enterprise security and data centre management]

2018-12-02 Thread Dan Brown
Is the security property  mentioned below a defined goal of, and proved‎ for, TLS 1.3? Just curious, because it seems a little counter-intuitive: ‎impersonation of an anonymous (unauthenticated) client, under the harsh conditions of all content in the clear. It is certainly plausible by regardi

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-30 Thread Dan Brown
to be potentially unsafe” loses most of these nuances. From: Eric Rescorla [mailto:e...@rtfm.com] Sent: Tuesday, July 17, 2018 11:02 AM To: Dan Brown Cc: Hanno Böck ; tls@ietf.org Subject: Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3? Well, I note that the text also says

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-17 Thread Dan Brown
It's mainly due to CFRG's advice, isn't it? Calling other curves potentially unsafe or inappropriate for general use is a bit harsh and outside the scope of TLS, isn't it? As to using a narrow or wide set of curves, there are reputable proposals for the latter: ia.cr/2015/647 and ia.cr/2015/366

Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-19 Thread Dan Brown
Dear TLS WG, Enterprise "visibility" is a network issue, not an Internet issue, and thus, to my _limited_ understanding, should be out of scope of IETF. Nonetheless, enterprise security is important, and enterprise networks use Internet technology internally, so the topic is perhaps still proce

Re: [TLS] Preshared Keypairs for (D)TLS 1.2

2017-10-26 Thread Dan Brown
Hi Tony, Perhaps (some variant of) Menezes-Qu-Vanstone MQV key agreement might work for your problem. There are some security analyses for variants MQV, e.g. HMQV, and it offers even better efficiency than triple-DH. The original MQV appears in a few standards (NIST SP 63a, IEEE 1363, ANSI X9

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-31 Thread Dan Brown
-Original Message- From: Stephen Farrell [mailto:stephen.farr...@cs.tcd.ie] I don't think this is simply a case of multiple CSPRNGs. DB> Not quite sure what you mean by "simply a case of multiple CSPRNGs", but I am starting to get an idea below. My guess is many TLS implementations don

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-29 Thread Dan Brown
d primes, but is plausible and relevant to the question at hand. (I thought I mentioned this earlier.) From: Colm MacCárthaigh Sent: Saturday, July 29, 2017 2:04 PM To: Dan Brown Cc: Stephen Farrell; Eric Rescorla; Blumenthal, Uri - 0553 - MITLL; tls@ietf.org Subject: Re: [TLS] 32 byte randoms in

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-29 Thread Dan Brown
https://eprint.iacr.org/2012/064 mentions the problem of generating multiple secrets instead of a single secret Original Message From: Stephen Farrell Sent: Friday, July 28, 2017 11:48 AM To: Dan Brown; Eric Rescorla; Blumenthal, Uri - 0553 - MITLL Cc: tls@ietf.org Subject: Re: [TLS] 32 byte

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-28 Thread Dan Brown
Replies in-line (non-standardly enclosed with << >>, sorry ;) -Original Message- From: ilariliusva...@welho.com [mailto:ilariliusva...@welho.com] Sent: Friday, July 28, 2017 11:09 AM To: Dan Brown Cc: tls@ietf.org Subject: Re: [TLS] 32 byte randoms in TLS1.3 hello'

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-28 Thread Dan Brown
hu, Jul 27, 2017 at 4:43 PM, Blumenthal, Uri - 0553 - MITLL < > u...@ll.mit.edu> wrote: > >> Respectfully disagree. Having two cryptographically independent >> PRNGs, one for public data and one for key material, IMHO is a good >> idea. Of course, both should be pro

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-27 Thread Dan Brown
I don't think 2 CSPRNGs is a good idea. Wasn’t there a few years back some RSA keys with separate p and q, generated independently leading to an attack... Here if the seeds to initialize the RNGS are related, or one is weak, or worst if the seed is a raw source that doesn’t change in the momen

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-24 Thread Dan Brown
hdraw them. I did look over 1.3 once, fwiw, but have since forgot the details, sorry. Original Message From: Russ Housley Sent: Monday, July 24, 2017 12:58 PM To: Dan Brown Cc: IETF TLS Subject: Re: [TLS] 32 byte randoms in TLS1.3 hello's there was a discussion of adding a statement that a

Re: [TLS] 32 byte randoms in TLS1.3 hello's

2017-07-24 Thread Dan Brown
Hmm, I'd appreciate a brief reminder* of why 1.3 needs nonces at all, given that ephemeral DH is mandated, if anybody has the time/patience. (* ok, not that I truly ever knew). I assume that the risk of misusing the nonces, to exfiltrate keys etc, is small enough compared to other side channels

Re: [TLS] chairs - please shutdown wiretapping discussion...

2017-07-09 Thread Dan Brown
I agree with Stephen: this ID and all its detailed discussion should move over to the Intranet ETF and/or the Internet Subverting TF (wherever such a TF may be).‎ TLS 1.3 is already a big change. Sent from my BlackBerry 10 smartphone on the Rogers network. Original Message From: Stephen Farrel

Re: [TLS] [SUSPECTED URL!]Re: Requiring that (EC)DHE public values be fresh

2017-01-01 Thread Dan Brown
not designed to be decrypted by third-parties—that's kind of the >> point. Thus anyone doing this should not be surprised to hit a few >> MUST NOTs and, potentially, to have to configure implementations to >> allow such a deployment. > > The (presumably) accidental reu

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-11-25 Thread Dan Brown
I don't oppose any of the 4 given options, but I slightly prefer TLS 2.0, it seems simple and clear. In my opinion, the whole SSL vs TLS confusion needs better education to confront, version numbers (even dates) alone might not be enough. Renaming *SSL products to *TLS should help. Avoiding

Re: [TLS] TLS Visibility Inside the Data Center (was: I-D Action: draft-green-tls-static-dh-in-tls13-00.txt)

2016-11-16 Thread Dan Brown
Isn’t possible to achieve the goals of this proposal without re-using DH secrets? For example, let DH_secret = KDF ( monitoring_key, server.hello , client.hello), or something similar. Ideally, the monitoring_key should be updated frequently as possible (while keeping it synchronized). From:

Re: [TLS] Industry Concerns about TLS 1.3

2016-09-28 Thread Dan Brown
Please keep aiming for forward-secrecy. (Just in case my wording has been unclear.) From: Yoav Nir [mailto:ynir.i...@gmail.com] Sent: Wednesday, September 28, 2016 1:51 PM >On 28 Sep 2016, at 7:16 PM, Dan Brown <mailto:danibr...@blackberry.com> wrote:   >> I know little about ex

Re: [TLS] Industry Concerns about TLS 1.3

2016-09-28 Thread Dan Brown
As I understand the concern, the worry is that Bud is compromising Bob's (TLS) server, to somehow send Bob's plaintext to the wrong place. The proposed (existing?) strategy has Bob compromising his own forward-secrecy to stop Bud, but only after the cat is out of the bag. This seems a high pri

Re: [TLS] Industry Concerns about TLS 1.3

2016-09-23 Thread Dan Brown
Weaker crypto to stop insider attacks, is that the request? (And practice?) Doesn’t that increase the risk of larger (but perhaps rarer) further insider attacks? From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Hugo Krawczyk Sent: Thursday, September 22, 2016 7:41 PM To: BITS Security Cc: t

Re: [TLS] (selection criteria for crypto primitives) Re: sect571r1

2015-07-16 Thread Dan Brown
r meant random as opposed to k which meant koblitz.  the koblitz curve had a and b coefficients like 0 and 1, but the r curves had a and b derived from output of hash... back in 2000 when SEC2 came out introducing these names (and OIDS) the attacks on special curves (MOV and SASS attacks) were

Re: [TLS] sect571r1

2015-07-15 Thread Dan Brown
akest link. Ideally, the rainy day backups should be disabled by default, but possible to quickly enable, by administrator configuration or patch. From: Tony Arcieri Sent: Wednesday, July 15, 2015 9:47 PM To: Dan Brown Cc: Martin Rex; Subject: Re: [TLS] sect571r1 On Wed, Jul 15, 2015 at 6:

Re: [TLS] sect571r1

2015-07-15 Thread Dan Brown
Binary curves have some risks, due to recent work of Semaev on subexponential ECDLP, building on much past work. Even so, there's an argument from Koblitz and Menezes that special curves (e.g. binary curves) may survive some wider collapse. I think it's a weak argument, but for those for whom s