> On Dec 4, 2015, at 10:11, Hubert Kario <hka...@redhat.com> wrote:
> 
>> On Friday 04 December 2015 00:52:08 Hanno Böck wrote:
>> On Thu, 3 Dec 2015 18:45:14 -0500
>> 
>> Watson Ladd <watsonbl...@gmail.com> wrote:
>>>> On Tue, Dec 1, 2015 at 3:02 PM, Hanno Böck <ha...@hboeck.de> wrote:
>>>> So as long as you make sure you implement all the proper
>>>> countermeasures against that you should be fine. (Granted: This is
>>>> tricky, as has been shown by previous results, even the OpenSSL
>>>> implementation was lacking proper countermeasures not that long
>>>> ago,
>>>> but it's not impossible)
>>> 
>>> Can you describe the complete set of required countermeasures, and
>>> prove they work comprehensively? What if the code is running on
>>> shared hosting, where much better timing attacks are possible?
>>> What's shocking is that this has been going on for well over a
>>> decade: the right solution is to use robust key exchanges, and yet
>>> despite knowing that this is possible, we've decided to throw patch
>>> onto patch on top of a fundamentally broken idea. There is no fix
>>> for PKCS 1.5 encryption, just dirty hacks rooted in accidents of
>>> TLS.
>> 
>> No disagreement here.
>> 
>> The thing is, we have a bunch of difficult options to choose from:
>> 
>> * Fully deprecate RSA key exchange.
>> The compatibility costs of this one are high. They are even higher
>> considering the fact that chrome wants to deprecate dhe and use rsa as
>> their fallback for hosts not doing ecdhe. ecdhe implementations
>> weren't widespred until quite recently. A lot of patent foo has e.g.
>> stopped some linux distros from shipping it.
> 
> Then maybe Chrome should reconsider.
> 
> I think we're overstating the compatibility costs.
> 
> very few widely deployed implementations (with the exception of the long 
> deprecated Windows XP) lack support for DHE_RSA *and* ECDHE_RSA at the 
> same time

The main issue with DHE_RSA is that there are still too many servers which will 
use short DHE group (<1024 bits). When connecting to those servers, using RSA 
is (presumably) safer.

From a compatibility aspect it's much simpler and safer to just disable DHE 
completely than to try to enforce a DHE limit, which would require a fallback 
connection to RSA.


-- Fabrice. 


> -- 
> Regards,
> Hubert Kario
> Senior Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to