On Fri, Mar 28, 2014 at 07:27:59PM +0100, Dr. Stephen Henson wrote:

> One possibility I'd considered is to move levels 1 and above along one. Then
> you'd have...
> 
> Level 0: anything goes.
> Level 1: almost anything goes but stupid stuff like DH, RSA keys < 512 bits
> excluded.

And the corresponding EXPORT algorithms I suppose.  This level 1
might well be a sensible default.  I am not aware of any systems
that don't support at least 80-bit crypto (with SHA1 being the
80-bit anchor, the rest is generally closer to 128-bit).

> Level n: same as current level n-1.

That may well be better, plus warnings about blindly playing the "my
level is higher than yours" game.  And I think session ticket support
not be dropped at 128-bit strength.

I should note that nothing in RFC 5077 requires AES128 for the
ticket bulk crypto, the ticket IV is limited to 128-bits but that's
a constraint on the block size, not key length.  Furthermore the
security of HMAC-SHA-256 is not 128-bits, it is 256 bits, since
attacks on this are pre-image attacks, not collision attacks.

Therefore, implementations can over time move to encrypt session
tickets with 256-bit keys.  So I would not exclude session tickets
at any of the security levels, this adds no security, but makes
the use of security less likely (more expensive handshakes, more
server hardware, ...).

There are important trade-offs here, and adhering to SP-800 too
closely can cause more harm than good.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to