On Tue, Mar 21, 2017 at 12:44 AM, Yoav Nir <ynir.i...@gmail.com> wrote:

> Hi
>
> This pull request addresses most of these comments.
> https://github.com/tlswg/rfc4492bis/pull/39  There is some discussion on
> that PR
>
> Some that are not addressed, I’ve answered below.  Let me know if you want
> me to merge and submit.
>
> Yoav
>
> On 15 Mar 2017, at 16:44, Eric Rescorla <e...@rtfm.com> wrote
>
>
> Sorry for the late review of this document. I just got to it this
> week. I'm sending this as comments rather than issues/PR due to
> how late it is in the proces.
>
> I have two high-level comments:
>
> - This document seems to still have a bunch of material about
>   static DH (especially static DH authentication). I thought we
>   had agreed to remove that.
>
> - You are inconsistent about using capital 2119 language
>   and I expect you want to be consistent.
>
>
> DETAILED
> S 2.
>    All of these key exchange algorithms provide forward secrecy.
>
> This is actually only true if each side generates fresh ephemerals
> which does not seem to be required by the spec.
>
> Do we really want to promote ECDH_anon to standards track?
>
>
> It’s the EC version of DH_anon, which is on the standards-track. I don’t
> expect to convert the web to use DH_anon, but its security is very much
> like what you get with a self-issued certificate, with many less bytes on
> the wire.
>

Well, assuming you don't do TOFU.

, neither do I.  I reworded it.
>
>
> S 5.8.
>    This message is sent when the client sends a client certificate
>    containing a public key usable for digital signatures, e.g., when the
>    client is authenticated using the ECDSA_sign mechanism.
>
> This is the only way that things can work now.
>
>
> S 5.1.1.
>    Failing to
>    do so allows attackers to gain information about the private key, to
>    the point that they may recover the entire private key in a few
>    requests, if that key is not really ephemeral.
>
> To the best of my knowledge, this only applies to DH, not signature
> verification.
>
> S 6.
> Do we really want to promote NULL and 3DES to ST?
>
>
> The place to remove 3DES is TLS 1.3.
>

Well, we certainly did that, but why?



> The alternative is to either deprecate it for TLS 1.2
>

This seems like it might be reasonable at this point.



> or to not obsolete 4492. NULL is a little more nuanced, but I think the
> same argument applies.
>

What we probably should actually do is make this depend on the IANA draft
and then mark
these Not Recommended.

-Ekr


>
> Yoav
>
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to