9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: Alex Weber <alexwebr@gmail.com>
To: Fans of the OS Plan 9 from Bell Labs <9fans@9fans.net>
Subject: Re: [9fans] using tls-psk cipher suits vs roll our own handshake
Date: Thu, 24 Dec 2015 20:34:05 -0600	[thread overview]
Message-ID: <CAGi9AcbUCjhPEeLQ8M-czhbGyEBc3xMJsYYfM1Gc0LSeSN2Xug@mail.gmail.com> (raw)
In-Reply-To: <9ba4246f4fec89c0bfe8e4e5e85f4fa6@felloff.net>

[-- Attachment #1: Type: text/plain, Size: 1806 bytes --]

Hi,

Has TLS-SRP been considered instead of TLS-PSK?

If the secret used for TLS-PSK comes entirely from a password, then TLS-SRP
might be a better choice. That's the extent of my knowledge of TLS-SRP. :)

-Alex

On Thu, Dec 24, 2015 at 5:49 PM, <cinap_lenrek@felloff.net> wrote:

>
> > 5) seems to much effort to do right/securely, no?
>
> kind of. one would indeed need to authenticate the messages somehow,
> and maintain lists of usefull cipher suits ect. which basically
> is what tls already does.
>
> right now, i'm kind of in favour for using tls-psk (rfc4279)
> even if it might seem like overkill at the moment. (its easy,
> just wrote the code)
>
> --
> cinap
>
> > On Thu, Dec 24, 2015 at 4:45 PM,  <cinap_lenrek@felloff.net> wrote:
> > > plan9 currently uses the shared secret from the authentication
> > > process with ssl and rc4 cipher for encrypting traffic for
> > > exportfs and the cpu services (pushssl()). the cipher can be
> > > changed by the client by providing command line parameters,
> > > tho there is no real negotiation going on. if the server
> > > doesnt like the cipher from the client, the connection just
> > > breaks.
> > >
> > > when switching to tls, we have a few options:
> > >
> > > 1) do as we do with ssl, client sends what cipher and hash alg
> > > it wants as a string before calling pushtls().
> > >
> > > 2) use fixed cipher like chacha20/poly1305 aead unconditionally.
> > >
> > > 3) use fixed cipher initially, and after that, renegotiate
> > > cipher (devtls can change secrets and ciphers inband).
> > >
> > > 4) use standard tls handshake with PSK cipher suits.
> > >
> > > 5) make our own little cipher negotiation handshake protocol.
> > >
> > > suggestions?
> > >
> > > --
> > > cinap
> > >
>
>

[-- Attachment #2: Type: text/html, Size: 2549 bytes --]

  reply	other threads:[~2015-12-25  2:34 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-12-24 16:45 cinap_lenrek
2015-12-24 17:09 ` Iruatã Souza
2015-12-24 23:49   ` cinap_lenrek
2015-12-25  2:34     ` Alex Weber [this message]
2015-12-25  3:03       ` cinap_lenrek
2015-12-29 18:34         ` Charles Forsyth
2015-12-29 18:35           ` Charles Forsyth
2016-01-03  4:03           ` cinap_lenrek
2015-12-29 20:31 ` Kenny Lasse Hoff Levinsen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAGi9AcbUCjhPEeLQ8M-czhbGyEBc3xMJsYYfM1Gc0LSeSN2Xug@mail.gmail.com \
    --to=alexwebr@gmail.com \
    --cc=9fans@9fans.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).