Hi TLS working group,

Draft [draft-ietf-tls-extended-key-update] proposes to add a public-key 
exchange-based method that can be used in place of the regular KeyUpdate 
mechanism in TLS (which only hashes the application keys).  In this manner, 
Extended Key Update (EKU) aims to achieve post-compromise security.
 
The Formal Analysis Triage Team [FATT] was asked to form an opinion on 
draft-ietf-tls-extended-key-update. This was briefly discussed between 
ourselves and I was asked to be "point person” for this draft: i.e., I will be 
presenting a summary of the discussion and its conclusion.

This report can be found at [slides] and I will present these slides in the 
second meeting of the TLS wg next week (Friday). Our conclusion is that the 
extension proposed changes the security properties of TLS 1.3 and does not fit 
will in existing analyses of TLS 1.3 – the slides try to explain this gap. I 
have also included an example of the subtleties that can have an effect on the 
ability to (easily) prove things.

Note that this does not mean that the mechanism proposed is or was insecure. We 
also thank the authors for their quick feedback when I had questions. It is 
also important to note that the FATT is not a gate keeper for any TLS working 
group consensus call; it only intends to inform it. 

Cheers,

Thom Wiggers

[draft-ietf-tls-extended-key-update]: 
https://datatracker.ietf.org/doc/draft-ietf-tls-extended-key-update/
[FATT]: https://github.com/tlswg/tls-fatt
[report]: 
https://datatracker.ietf.org/meeting/125/materials/slides-125-tls-sessa-fatt-report-on-eku-00
_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to