On 13/10/17 12:05, Hubert Kario wrote: > On Thursday, 12 October 2017 15:16:08 CEST Stephen Farrell wrote: >> (With the obvious caveat that I hate the whole >> idea... :-) > > to be clear: me too
IMO the more we hear of that the better
> 1. Alice sends a share to Bob: g^a
> 2. Bob sends Alice's and his share to Carol: g^a, g^b, g^ab
> 3. Carol replies to Bob with her share added to Alice's and his: g^ac, g^bc
> 4. Bob sends the Carol's reply to Alice as a Server Key Share: g^bc
> 5. Alice calculates the shared secret g^bca
> 6. Bob calculates the shared secret: g^acb
> 7. Carol calculates the shared secret: g^abc
>
> so it doesn't look to me like it requires a lot of chamfer to fit that square
> peg in the round hole, only the 2 and 3 need to happen out-of band.
>
> of course, I haven't analysed how Carol would be authenticated in that
> communication (if signing just the SKS by Carol is enough, transferred in the
> encrypted extensions, with server signature of the handshake in certificate
> verify being sufficient for integrity)
So the problems with that are numerous but include:
- there can be >1 carol, (and maybe all the carols also need to
"approve" of one another), if we were crazy enough to try do
this we'd have at least:
- corporate outbound snooper
- data-centre snooper (if you buy those supposed use-cases)
- government snooper(s) in places where they don't care about
doing that openly
...port 80 would suddenly be quicker than 443 again;-(
- carol is quite likely to only have a name like: 2001:db8::bad:1dea
or your.friendly-listener.bigcdn.example.net and authenticating
those is essentially meaningless to the endpoints in most TLS contexts
whether or not those endpoints have humans associated with them
- the TLS endpoints can't handle the semantics of allowing in Carol(s)
as those endpoints were designed to use TLS and not bolloxed-TLS (be
that mcTLS or draft-rehired)
So I think this ends up as bad as the design in draft-rehired. Which
of them is more obviously bad is another question.
Cheers,
S.
signature.asc
Description: OpenPGP digital signature
_______________________________________________ TLS mailing list [email protected] https://www.ietf.org/mailman/listinfo/tls
