Once again, we are moving the responsibility over security best
practices from vendors into users. We should know better by now.
Thanks,
Yaron
On 16/11/16 15:56, Daniel Migault wrote:
Given the discussions on curdle. the trend is to use an empty context
with a clear security recommendation of using dedicated keys for each usage.
Yours
Daniel
On Nov 16, 2016 3:34 PM, "Yoav Nir" <[email protected]
<mailto:[email protected]>> wrote:
But yes, I agree that IPsec, TLS and Curdle should come to the same
conclusion either way.
And I think that in light of existing deployment, Ed25519ctx *with*
context is a very hard sell.
Yoav
> On 16 Nov 2016, at 15:32, Yoav Nir <[email protected]
<mailto:[email protected]>> wrote:
>
> No, I think he means Ed448 and Ed25519.
>
> Adding context to Ed25519 (so using Ed25519ctx) requires using a
different function than the one available in several implementations
such as libsodium.
>
> If we choose the no context option it doesn’t matter: Ed25519ctx
with empty context == Ed25519ctx
>
> Yoav
>
>> On 16 Nov 2016, at 13:58, Yaron Sheffer <[email protected]
<mailto:[email protected]>> wrote:
>>
>> If you mean the same policy for IPsec and TLS, I fully agree.
>>
>> Context prevents cross-protocol attacks, and I wouldn't worry
about "encouraging bad behavior". Users will behave badly whether we
encourage them or not :-)
>>
>> Thanks,
>> Yaron
>>
>> On 16/11/16 13:47, Daniel Migault wrote:
>>> i would like the same policy - context or no context - applied
to both
>>> EdDSA algo. ctx prevents cross protocol attacks but may
encourage bad
>>> practice.
>>>
>>> Yours,
>>> Daniel
>>>
>>>
>>> On Nov 16, 2016 1:35 PM, "Yaron Sheffer" <[email protected]
<mailto:[email protected]>
>>> <mailto:[email protected] <mailto:[email protected]>>>
wrote:
>>>
>>>
>>>
>>> On 16/11/16 12:41, Paul Wouters wrote:
>>>
>>>
>>>
>>> On Nov 16, 2016, at 10:49, Yoav Nir
<[email protected] <mailto:[email protected]>
>>> <mailto:[email protected]
<mailto:[email protected]>>> wrote:
>>>
>>> So I suggest to add the following paragraph at the end of
>>> section 2 of the eddsa draft:
>>>
>>> The context parameter for Ed448 MUST be set to the empty
>>> string.
>>>
>>>
>>> I agree. Context seems useful for generic crypto but not for
>>> something that is already strongly bound by an IETF transport
>>> protocol.
>>>
>>> Additionally, we have a similar problem too when allowing the
>>> same key in IKEv1 and IKEv2 where the key has different
security
>>> properties.
>>>
>>> Paul
>>>
>>>
>>> I don't think there's any cost to having a non-empty context
string,
>>> e.g. "IKEv2", and there's potentially value. TLS cross-protocol
>>> attacks show that signatures can be abused even when embedded in a
>>> transport protocol.
>>>
>>> The fact that we have the same problem elsewhere is no reason to
>>> propagate it further.
>>>
>>> Thanks,
>>> Yaron
>>>
>>>
>>> _______________________________________________
>>> IPsec mailing list
>>> [email protected] <mailto:[email protected]> <mailto:[email protected]
<mailto:[email protected]>>
>>> https://www.ietf.org/mailman/listinfo/ipsec
<https://www.ietf.org/mailman/listinfo/ipsec>
>>> <https://www.ietf.org/mailman/listinfo/ipsec
<https://www.ietf.org/mailman/listinfo/ipsec>>
>>>
>>>
>
_______________________________________________
IPsec mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/ipsec
<https://www.ietf.org/mailman/listinfo/ipsec>
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec