#tlsnotary-chat

/

      • belcher joined the channel
      • proslogion joined the channel
      • proslogion
        waxwing: https://en.wikipedia.org/wiki/Three-pass_protocol I presume you have read this before?
      • waxwing
        proslogion: not that page no. though the idea i've seen in many places.
      • proslogion
        waxwing: it occurs to me that, in a typical DH protocol, when you send a g^a mod p to the other party, an eavesdropper cannot distinguish if g is some base specified in a general protocol, or it's a secret message m, so Alice can hide a message m in the form of m^a mod p, and send it to the server Bob, but Bob wouldn't know if it's a general DH pubkey as well, so he just does (m^a)^b mod p and send it back regardless
      • no there is a caveat
      • waxwing: so basically, TLStweet wouldn't work too well, if the pubkey is ephemeral
      • proslogion has quit
      • proslogion joined the channel
      • waxwing
        proslogion: i'm a bit lost about the details of that, but clearly there'd be some long lived pubkey that has to be known out of band.
      • i'll have to go back and look at my first stab at writing some code and figure out what i was doing ..
      • proslogion
        waxwing: right, this part may make the whole communication not so stealth....
      • waxwing
        proslogion: you think? but first, what scenario are you considering
      • alice communicates with server, or alice communicates with another client?
      • proslogion
        alice communicates with server
      • waxwing
        ok
      • so yeah the first issue is how the server knows it's a communication.
      • proslogion
        right
      • waxwing
        it's that old thing in cryptanalysis: how do you know you've succeeded in cracking. the usual answer is an hmac
      • or other hash
      • well forget 'cracking', i mean successful decryption. hmac the message.
      • proslogion
        hmmm
      • waxwing
        so if tlstweet is mac-then-encrypt then the matt greens of this world will put a price on my head :)
      • proslogion
        waxwing: right, but that doesn't change the fact that some keys have to be distributed first, and the distribution itself is suspicious
      • oh i c
      • waxwing
        proslogion: at least, server's key has to be out there. i'm guessing you're still interested in applications where the server is helping the client jump over certain kinds of wall?
      • proslogion
        alice could encrypt something using the server's pubkey, in the client random field
      • the server doesn't need her pubkey
      • hmmm that's good
      • waxwing
        proslogion: possibly, but that's why i asked about the application you're interested in
      • proslogion
        waxwing: yes, we are on the same page, i just didn't realize the server doesn't need client's pubkey
      • waxwing
        proslogion: well, but only if the idea is just instructions and not 2-way conversation
      • i originally had in mind 2 way conversation
      • i suppose client could send pubkey in message, is that it
      • proslogion
        i am thinking the same
      • waxwing
        yeah that works eh
      • can the server's TLS cert pubkey be used for this? there might be some technical difficulties there
      • proslogion
        i don't see why not
      • waxwing
        i was imagining 28 byte instead of 32 byte key
      • proslogion
        waxwing: does the client need to sign his DH pubkey in a DH keyexchange as specified in the TLS RFCs?
      • waxwing
        not in 5246 , i just looked
      • 7.4.7.2
      • proslogion
        hmmm, i guess as long as the server signs it, it's fine, heh
      • waxwing
        yeah server signs
      • proslogion
        you can't use a shared key if one of the two halves gets replaced
      • ah, i just realize that the server sends first in a TLS DH session
      • silly me :)
      • the key exchange message i meant
      • waxwing
        OT but this is amazing. Textbook costs $92 :) https://www.reddit.com/r/math/comments/3k1qe6/t...
      • proslogion
        waxwing: what language do you plan to use for the server side development? i don't think python can really be used for developing http server modules and stuff?
      • waxwing
        proslogion: i don't plan anything :) i agree that, except for maybe some proof of concept, you wouldn't do this in python.
      • i'd imagine making some kind of patch to nginx or apache or whatever
      • client side is different ... i guess you could do anything, maybe javascript, or whatever you want
      • proslogion
        yes
      • otoh people have written TLS stack in JS ;)
      • waxwing
        i did mull over the possibilities a bit .. i think it might be quite feasible to leave the server untouched and have a little module that you route the traffic through, on the server machine
      • "leave the server untouched" = leave the server software untouched.
      • you know, like pipe it through a port on localhost
      • proslogion
        well, yeah, but to state the obvious, performance issues, maybe using in memory hash-tables and moon stuff like that
      • no, not really
      • AES decryption would almost have no impact on performance, otoh RSA....
      • waxwing: re the textbook, hardly surprising, consider how many in American high school really need to study at this level...
      • waxwing
        yes it's arguably just as bad to throw a 'fact' in there when students aren't equipped to understand it, as to get the fact horribly wrong.
      • but i guess what enrages people so much about it is the fact that this is one of the very few bits of 'advanced' mathematics that *anyone* can understand. to botch up such a beautiful piece of mathematics is a crime.
      • proslogion
        oh, so surjection is called "onto correspondence" in high-school speak, okay
      • waxwing
        yeah 'one to one' and 'onto' are commonly used
      • proslogion has quit
      • mkarrer_ joined the channel
      • proslogion joined the channel
      • not particularly ground breaking i think.
      • proslogion has quit
      • hearn joined the channel
      • waxwing joined the channel
      • hearn_ joined the channel
      • hearn has quit
      • hearn_ is now known as hearn
      • proslogion joined the channel
      • hearn has quit
      • hearn joined the channel
      • hearn has quit
      • proslogion has quit
      • proslogion joined the channel
      • proslogion
      • belcher joined the channel
      • proslogion has quit
      • proslogion joined the channel
      • mkarrer joined the channel
      • proslogion has quit