Peter Saint-Andre <[email protected]> writes:
>Hi Cullen, having looked more closely at the text that's already in 7525bis,
>I have a few questions inline...
Me too, specifically in regard to the "DHE negotiation is broken" comment.
The draft says:
However, TLS 1.2 implementations SHOULD
NOT negotiate cipher suites based on ephemeral finite-field
Diffie-Hellman key agreement (i.e., "TLS_DHE_*" suites). This is
justified by the known fragility of the construction (see
[RACCOON])
Raccoon relies on reuse of ephemeral values. If a DH*Ephemeral*
implementation reuses the ephemeral values it's not TLS_DHE_whatever any more,
it's TLS_DH_whatever. So this isn't a valid criticism of DHE, since it's not
DHE.
It's really not that hard to do DHE properly. The solution isn't to throw out
all use of DHE [0] but to specify what to do to avoid doing DHE badly.
Peter.
[0] A problem all too common in crypto protocols, instead of specifying a few
simple steps to fix this one we'll throw the whole thing out and invent a
completely new one, and start again from scratch with a new set of flaws
to discover over time.
_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta