>> I don't hear a lot of opposition to maintaining agility in ciphersuite
>> preference.
>
>
> <cough>  It was discussed about 6 months to a year ago.
>
> The alternate -- loosely known as 1TCS or one true cipher suite -- has been
> proposed on the basis that if it is ever going to be useful, then the place
> it will be most useful is TCPINC.  Because TCPINC is MITMable anyway, why
> worry so much about the purported benefits of algorithmic agility?

You may have an argument for a minimal implementation of the WG's
goals, but both TCP-ENO/tcpcrypt and TLS-over-TCP are trying to
achieve a solution for opportunistic encryption that is also the basis
for an authenticated channel for applications that want the upgrade
against active attacks.

If, in the case of tcpcrypt, the cipher suite is chosen by the kernel
at connection time before the application is even told that the
connection has been established, then it's critical for that cipher
suite to be secure against active attacks in the presence of endpoint
authentication. Best practice here is that it be upgradeable, because
nothing is secure forever. Strictly speaking, I think the 1TCS notion
is *possible*, but there's simply no way to rule out future
revolutions in cryptanalysis.

> However basic IETF consensus or practice is that protocols maintain agility,
> and there is a coming draft on that.

Agreed in principle, but can you be more specific on this draft?

Kyle

_______________________________________________
Tcpinc mailing list
Tcpinc@ietf.org
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to