Cool, I'll propose some text in the cases you mentioned.

> On Aug 20, 2020, at 6:10 AM, Christopher Wood <c...@heapingbits.net> wrote:
> 
> On Wed, Aug 19, 2020, at 6:42 PM, Carrick Bartle wrote:
>> Thanks for the feedback! I've posted a bunch of PRs and issues, as 
>> you've seen. Here are my remaining comments:
>> 
>>>>> Low entropy keys are only secure against active attack if a PAKE is 
>>>> used with TLS.
>>>> Maybe cite a document that contains a recommended way of using PAKEs 
>>>> with TLS (e.g. draft-sullivan-tls-opaque-00)?
>>> 
>>> I'd rather not cite one (now), especially since that document is expired. 
>>> Perhaps we can file an issue to add a citation later on?
>> 
>> Looks like Mohit already added a more up-to-date citation.
>> 
>>> Filed: https://github.com/tlswg/external-psk-design-team/issues/36
>> 
>> Thanks, Mohit! :)
>> 
>>>>> Preventing this type of linkability is out of scope, as PSKs are 
>>>>> explicitly designed to support mutual authentication.Isn't mutual 
>>>>> authentication, in general, orthogonal to linkability? 
>>>> Certificates, for example, are encrypted in TLS 1.3, and so cannot be 
>>>> linked across connections.
>>> 
>>> This section speaks of linkability by the endpoints, not the network. Any 
>>> sort of identifier that's reused across connections can be linkable, be it 
>>> an external PSK ID or a certificate. 
>> 
>> Right, I get that. What I'm saying is that since there are solutions 
>> that can prevent that type of linkability (for instance, if a third 
>> party deals the PSKs to the server and clients, and those PSKs are 
>> never used more than once), the fact that PSKs are designed to support 
>> mutual authentication is irrelevant. (I.e., mutual authentication for 
>> one connection doesn't necessarily imply that the server knows it's 
>> talking to the same client on every connection that client makes.)
> 
> I think the preceding sentence provides the missing context:
> 
> "Specifically, servers can link successive connections that use the same 
> external PSK together. Preventing this type of linkability is out of scope, 
> as PSKs are explicitly designed to support mutual authentication."
> 
> That said, I see what you're saying. We can just drop "as PSKs are explicitly 
> designed to support mutual authentication." 
> 
>>>>> 6.1.  Provisioning Examples
>>>> This section contains a list of ways to provision PSKs, but mostly 
>>>> without any commentary or discussion. Are these methods good? Bad? Are 
>>>> there any pitfalls? If so, how can one guard against them?
>>> 
>>> It's meant to be informational without any comment on the pros and cons of 
>>> each. 
>> 
>> But the title is "*Guidance* for External PSK Usage." What is guidance 
>> if not a collection of recommendations?
> 
> This particular bit of the document describes use cases which informed the 
> guidance (recommendations) for PSK usage described elsewhere.
> 
>>>>> Identities may sometimes need to be routable, as is currently under 
>>>> discussion for EAP-TLS-PSK.
>>>> What does it mean for an identity to be "routable"? Also, EAP-TLS-PSK 
>>>> needs a citation link. I'm not sure which document it's referring to.
>>> 
>>> It might be, for example, a FQDN. Mohit understands the EAP-TLS-PSK use 
>>> case better than I do, though, so I'll let him answer. 
>> Looks like Mohit added a citation for that.
>> 
>>>>>  3.  Nodes SHOULD use external PSK importers 
>>>>> [I-D.ietf-tls-external-psk-importer] when configuring PSKs for a pair of 
>>>>> TLS client and server.
>>>> Why?
>>> 
>>> Because that interface exists to enable external PSKs for TLS 1.3 and 
>>> beyond. 
>> 
>> My understanding is that that interface doesn't *enable* external PSKs 
>> for 1.3, but that it just to makes it easier and less error-prone 
>> because the interface generates several PSKs--one for each hash 
>> function. Is that the case? If so, why not mention that as the 
>> rationale as to why nodes SHOULD use the importer?
> 
> That seems like a fine clarification. Do you want to propose some text?
> 
>>>>> OpenSSL and BoringSSL: Applications specify support for external PSKs 
>>>> via distinct ciphersuites.
>>>> This is not true of BoringSSL for TLS 1.3. Although the paragraph goes 
>>>> on to mention "new callback functions added specifically to OpenSSL for 
>>>> TLS 1.3 [RFC8446] PSK support," this doesn't preclude 1.3 PSK support 
>>>> in BoringSSL.
>>> 
>>> We didn't want to go into version-specific details here, but yes, that's 
>>> right. 
>> 
>> Might be better to mention this particular version-specific detail here 
>> since otherwise this statement is misleading.
> 
> That sounds reasonable. Can you please propose text?
> 
>>>>> some systems require the provisioning process to embed 
>>>> application-specific information in either PSKs or their identities.
>>>> Is it really a good idea to embed data in the PSK itself? Does that not 
>>>> diminish the entropy of the PSK? Why is it not sufficient to put that 
>>>> sort of information in the identity?
>>> 
>>> It is probably desirable to use the identity for this purpose since, 
>> well, its application-specific identifying information. This is just 
>> commenting on the state of affairs, I think.
>> Okay, but if this document is guidance and not just a description, 
>> shouldn't it also comment on whether this state of affairs is a good 
>> idea?
> 
> As above, this section is more about documenting the situations and use cases 
> which informed the recommendations. I don't think commenting on the pros and 
> cons of the solution beyond that is needed.
> 
> Thanks again!
> 
> Best,
> Chris

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to