Closed chris-wood closed 2 years ago
- For applications we know about, such as OPAQUE or PrivacyPass, say whether the static DH is exposed, and how.
As above, I don't think we should describe that in this document.
- Say that applications can partially mitigate attacks that use a static-DH oracle by rate-limiting requests from clients.
- RECOMMEND frequent key rotation.
These can be harmful for some applications, so I'll just note them as possibilities.
@cjpatton addressed your comments!
Thanks for the review, @cjpatton! This PR tracks changes to most of your suggestions, with some tweaks.
I took most of your editorial and protocol change suggestion as they were great. I reworked the security considerations section to remove unhelpful jargon and focus on applications and implementers. I'd like to call your attention to the {{limits}} section, which tries to collapse much of the previous text into a straightforward description of the static DH problem and its impact on the group security level.
Right now I don't have any good ideas for sharpening the application guidance against this problem beyond what's there. ("If you admit an oracle and want more than 128 bits of security, use a larger group.") I would welcome concrete suggestions for improving the text here.
cc @tomrist, @nirvantyagi for 👀 on the new security considerations, too, which you can find rendered here.
cc @kevinlewi, @bytemare for 👀 regarding other editorial changes.
Closes #317. Closes #316. Closes #315.