Hi Hanno,

We have done tests on this and it there is a difference.  For some industries 
(industrial automation) throughput is very sensitive so what might appear as a 
small difference can actually be quite significant.  On that same note, yes you 
are absolutely correct that the asymmetric handshake is far more 
computationally expensive.  However, this generally happens at the start of a 
connection where timing is less sensitive.  Once the application I/O is 
actually being sent/received is when the performance really becomes sensitive. 

Point taken that the ciphersuites could be used within an application where it 
isn't appropriate, however this would have to be weighed against the benefit of 
industries adopting TLS 1.3 and securing the many IoT applications that desire 
this.  This probably goes without saying but of course the best line of defense 
is to properly design, build, and configure the implementation.  I recognize 
that doesn't completely obviate your point but it does seem relevant.

Thanks,

--Jack

-----Original Message-----
From: TLS <[email protected]> On Behalf Of Hanno Böck
Sent: Tuesday, February 26, 2019 4:04 PM
To: [email protected]
Subject: EXTERNAL: Re: [TLS] Authentication Only Ciphersuites RFC

[Use caution with links & attachments]



I think I have raised my concerns before, but I have serious doubts there's 
real need for such ciphersuites.

The reasoning seems to be that performance constrained devices are unable to do 
"normal" TLS. I don't have benchmarks, but it's my experience that people 
vastly overestimate the costs of symmetric encryption operations (by far the 
largest computational cost of TLS is the asymmetric handshake). I wonder if the 
people who believe they need an authentication only ciphersuite ever ran tests.

I also see a non-neglegible risk in standardizing such ciphersuites.
Some implementations will end up adding them and coupled with implementation 
flaws we may end up in a situation where inadvertently insecure ciphersuites 
are chosen.

--
Hanno Böck
https://hboeck.de/

mail/jabber: [email protected]
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to