Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread James A. Donald
On 2011-06-22 3:35 AM, Nico Williams wrote: My concern is that we already have a large number of technologies in the IETF for establishing channels[*]. We don't have a large number of satisfactory technologies. Indeed, I don't think we have any satisfactory technologies. Among the problems

Re: [cryptography] Repeated Encryptions Considered.... ?

2011-06-21 Thread Nico Williams
On Tue, Jun 21, 2011 at 5:38 PM, James A. Donald wrote: > The time is long overdue for an encryption protocol that is not layered on > top of tcp, and which has protocol negotiation built in. It's called IPsec (KEs + ESP[/AH]). Unfortunately you kinda need an implementation of RFC5660 in order f

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread James A. Donald
On 2011-06-21 11:50 PM, Peter Gutmann wrote: > The problem is that introducing a totally new crypto API today is going to be pretty much impossible. The NSA, in the mid to late 1990s, when the only well-established crypto API around was PKCS #11, published three different reports on crypto API d

Re: [cryptography] Repeated Encryptions Considered.... ?

2011-06-21 Thread James A. Donald
On 19/06/11 9:47 PM, Jon Callas wrote: Why not send *all* your network traffic over TLS? On 2011-06-22 7:14 AM, Ian G wrote: The typical reasons for not using TLS would be (a) it's a stream-oriented point-to-point protocol, whereas most activity is app-level datagram-oriented, (b) it's too clo

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-21 Thread Jeffrey Walton
On Tue, Jun 21, 2011 at 1:18 PM, Ian G wrote: > On 18/06/11 8:16 PM, Marsh Ray wrote: >> >> On 06/18/2011 03:08 PM, slinky wrote: > >>  But we know there are still hundreds of >> "trusted" root CAs, many from governments, that will silently install >> themselves into Windows at the request of

Re: [cryptography] Repeated Encryptions Considered.... ?

2011-06-21 Thread Nico Williams
On Tue, Jun 21, 2011 at 4:14 PM, Ian G wrote: >> Why not send *all* your network traffic over TLS? > > The typical reasons for not using TLS would be (a) it's a stream-oriented > point-to-point protocol, whereas most activity is app-level > datagram-oriented, (b) it's too closely linked with PKI /

Re: [cryptography] Repeated Encryptions Considered.... ?

2011-06-21 Thread Ian G
On 19/06/11 9:47 PM, Jon Callas wrote: On Jun 19, 2011, at 5:54 PM, Nico Williams wrote: On Sun, Jun 19, 2011 at 7:01 PM, Jon Callas wrote: That brings us back to the main question: what problem are you trying to solve? The OP meantioned that the context was JavaScript crypto, and whether

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Nico Williams
On Tue, Jun 21, 2011 at 2:10 PM, Marsh Ray wrote: > On 06/21/2011 10:27 AM, Nico Williams wrote: >> >> Martin Rex found the TLS renegotiation bug independently from Marsh >> Ray by thinking of how the SSPI is used to interface to TLS.  The SSPI >> was so faithful to TLS that it really exposed the

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-21 Thread Marsh Ray
On 06/21/2011 12:18 PM, Ian G wrote: On 18/06/11 8:16 PM, Marsh Ray wrote: On 06/18/2011 03:08 PM, slinky wrote: But we know there are still hundreds of "trusted" root CAs, many from governments, that will silently install themselves into Windows at the request of any website. Some of th

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-21 Thread Ian G
On 18/06/11 8:16 PM, Marsh Ray wrote: On 06/18/2011 03:08 PM, slinky wrote: But we know there are still hundreds of "trusted" root CAs, many from governments, that will silently install themselves into Windows at the request of any website. Some of these even have code signing capabiliti

Re: [cryptography] Oddity in common bcrypt implementation

2011-06-21 Thread Ian G
On 20/06/11 10:59 AM, Solar Designer wrote: On Wed, Jun 15, 2011 at 04:22:55AM +0400, Solar Designer wrote: I am trying to learn some lessons from this. This used to happen to me a lot in the old Cryptix days, which for a while were a sort of smorgasboard of algorithms. One lesson was tha

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Novikov, Lev
Cross-posted on . This is a discussion that started on the Cryptography mailing list: http://lists.randombit.net/pipermail/cryptography/2011-June/000940.html NOTE: You need to be a member to post on either list. RandomBit: http://lists.randombit.net/mailman/listinfo/cryptography IETF: https://

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Marsh Ray
On 06/21/2011 10:27 AM, Nico Williams wrote: Martin Rex found the TLS renegotiation bug independently from Marsh Ray by thinking of how the SSPI is used to interface to TLS. The SSPI was so faithful to TLS that it really exposed the bug. Right, so one of the lessons learned here was that if I

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Nico Williams
On Tue, Jun 21, 2011 at 1:17 PM, Novikov, Lev wrote: > On 2011-06-21 13:36, Nico Williams wrote: >> [...] My concern is that we already have a large number of >> technologies in the IETF for establishing channels[*].  Adding any >> more should require some strong justification for not using an >>

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Novikov, Lev
Nico, On 2011-06-21 13:36, Nico Williams wrote: > [...] My concern is that we already have a large number of > technologies in the IETF for establishing channels[*]. Adding any > more should require some strong justification for not using an > existing one. [...] But when we're talking about *

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Nico Williams
I'm quite concerned about this section 5 of http://tools.ietf.org/html/draft-lanz-cicm-lm-00, and, really, everything to do with "channels" in CICM. My concern is that we already have a large number of technologies in the IETF for establishing channels[*]. Adding any more should require some stro

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Novikov, Lev
On 2011-06-22 12:50, Peter Gutmann wrote: > The problem is that introducing a totally new crypto API today is > going to be pretty much impossible. [...] > I cannot imagine what size hammer you'd need to wield to convince > vendors to implement a totally new API for their products. [...] > The prob

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Nico Williams
You might say that the GSS-API is very TL-y or SASL-y too, since MSFT's SSPI (which is very similar to the GSS-API) has an interface to TLS and to SASL as well as to NTLM and the Kerberos GSS mechanism. Martin Rex found the TLS renegotiation bug independently from Marsh Ray by thinking of how the

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Nico Williams
On Jun 21, 2011 8:16 AM, "Peter Gutmann" wrote: > > Nico Williams writes: > > >Not so! Please point to some evidence if you wish to insist on this. > > GSS-API is pretty Kerberos-y. It may not have it directly baked in, but you > really have to squint at it pretty funny to go beyond Kerberos.

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Peter Gutmann
"Novikov, Lev" writes: >There is an existing class of devices and environments (e.g., military and >diplomatic communications) which have particular requirements that are hard >to retrofit into existing crypto APIs (i.e. the logical models are >substantially different). > >For example, many of th

Re: [cryptography] IETF Working Group Charter on Common Interface to Cryptographic Modules (CICM)

2011-06-21 Thread Peter Gutmann
Nico Williams writes: >Not so! Please point to some evidence if you wish to insist on this. GSS-API is pretty Kerberos-y. It may not have it directly baked in, but you really have to squint at it pretty funny to go beyond Kerberos. I know you can pretend it's not a meant-for-Kerberos API, but

Re: [cryptography] Oddity in common bcrypt implementation

2011-06-21 Thread Solar Designer
On Tue, Jun 21, 2011 at 03:38:39PM +1200, Peter Gutmann wrote: > Jeffrey Walton writes: > > >The 'details' mentioned above is at http://www.schneier.com/blowfish-bug.txt, > >and here's the crux of Morgan's report: > > > >[bfinit] chokes whenever the most significant bit > >of key[j] is a