[TLS][Editorial Errata Reported] RFC6347 (8089)

2024-08-23 Thread RFC Errata System
The following errata report has been submitted for RFC6347,
"Datagram Transport Layer Security Version 1.2".

--
You may review the report below and at:
https://www.rfc-editor.org/errata/eid8089

--
Type: Editorial
Reported by: Kamil Milewski 

Section: 4.2.2

Original Text
-
   struct {
 HandshakeType msg_type;
 uint24 length;
 uint16 message_seq;   // New field
 uint24 fragment_offset;   // New field
 uint24 fragment_length;   // New field
 select (HandshakeType) {
   case hello_request: HelloRequest;
   case client_hello:  ClientHello;
   case hello_verify_request: HelloVerifyRequest;  // New type
   case server_hello:  ServerHello;
   case certificate:Certificate;
   case server_key_exchange: ServerKeyExchange;
   case certificate_request: CertificateRequest;
   case server_hello_done:ServerHelloDone;
   case certificate_verify:  CertificateVerify;
   case client_key_exchange: ClientKeyExchange;
   case finished: Finished;
 } body;
   } Handshake;

Corrected Text
--
   struct {
 HandshakeType msg_type;
 uint24 length;
 uint16 message_seq;   // New field
 uint24 fragment_offset;   // New field
 uint24 fragment_length;   // New field
 select (HandshakeType) {
   case hello_request: HelloRequest;
   case client_hello:  ClientHello;
   case server_hello:  ServerHello;
   case hello_verify_request: HelloVerifyRequest;  // New field
   case certificate:Certificate;
   case server_key_exchange: ServerKeyExchange;
   case certificate_request: CertificateRequest;
   case server_hello_done:ServerHelloDone;
   case certificate_verify:  CertificateVerify;
   case client_key_exchange: ClientKeyExchange;
   case finished: Finished;
 } body; } Handshake;

Notes
-
Change the order of cases inside select field to keep it:
1. In ascending order
2. Consistent with the structure in 4.3.2

Instructions:
-
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--
RFC6347 (draft-ietf-tls-rfc4347-bis-06)
--
Title   : Datagram Transport Layer Security Version 1.2
Publication Date: January 2012
Author(s)   : E. Rescorla, N. Modadugu
Category: PROPOSED STANDARD
Source  : Transport Layer Security
Stream  : IETF
Verifying Party : IESG

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS]Consensus call for RFC8773bis Formal Analysis Requirement

2024-08-23 Thread Joseph Salowey
In regard to moving RFC 8773 to standards track the formal analysis triage
group has provided input on the need for formal analysis which was posted
to the list [1].  The authors have published a revision of the draft [2] to
address some of this feedback, however the general sentiment of the triage
panel was that there should be some additional symbolic analysis done to
verify the security properties of the draft and to verify there is no
negative impact on TLS 1.3 security properties.

The formal analysis is to verify the following properties of the proposal
in the draft:

- The properties of the handshake defined in Appendix E.1 of RFC8446 [3]
remain intact if either the external PSK is not compromised or (EC)DH is
unbroken.
- The public key certificate authentication works as in TLS 1.3, and this
extension adds the condition that the party has possession of the external
PSK. The details of external PSK distribution are outside the scope of this
extension.

This is a consensus call for the working group to determine how to proceed
between these two options:

1. Require formal analysis in the symbolic model to verify that the
proposal in the document does not negatively impact the security properties
of base TLS 1.3 and that the additional security properties cited above are
met
2. Proceed with publishing the document without additional formal
verification

Please respond to the list with a brief reason why you think the document
requires formal analysis or not. This call will end on September 16, 2024.

Thanks

Joe, Deirdre, and Sean

[1] https://mailarchive.ietf.org/arch/msg/tls/vK2N0vr83W6YlBQMIaVr9TeHzu4/
[2]
https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-8773bis-00&url2=draft-ietf-tls-8773bis-02&difftype=--html
[3] https://www.rfc-editor.org/rfc/rfc8446.html#appendix-E.1
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS]Re: [Editorial Errata Reported] RFC6347 (8089)

2024-08-23 Thread Rebecca VanRheenen
Hi Paul,

We are unable to verify this erratum that the submitter marked as editorial, so 
we changed the Type to “Technical”. As Stream Approver, please review and set 
the Status and Type accordingly (see the definitions at 
https://www.rfc-editor.org/errata-definitions/).

Notes:
* RFC 6347 has been obsoleted by RFC 9147. We see similar blocks of code in 
Section 5.2 and Appendix A.2 of RFC 9147.
* For information about errata on obsolete RFCs, see #7 in the IESG Statement 
on "IESG Processing of RFC Errata for the IETF Stream” 
(https://datatracker.ietf.org/doc/statement-iesg-iesg-processing-of-rfc-errata-for-the-ietf-stream-20210507/).

You may review the report at: 
https://www.rfc-editor.org/errata/eid8089

Information on how to verify errata reports can be found at: 
https://www.rfc-editor.org/how-to-verify/

Further information on errata can be found at: 
https://www.rfc-editor.org/errata.php

Best regards,
RFC Editor/rv


> On Aug 23, 2024, at 6:26 AM, RFC Errata System  
> wrote:
> 
> The following errata report has been submitted for RFC6347,
> "Datagram Transport Layer Security Version 1.2".
> 
> --
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid8089
> 
> --
> Type: Editorial
> Reported by: Kamil Milewski 
> 
> Section: 4.2.2
> 
> Original Text
> -
>   struct {
> HandshakeType msg_type;
> uint24 length;
> uint16 message_seq;   // New field
> uint24 fragment_offset;   // New field
> uint24 fragment_length;   // New field
> select (HandshakeType) {
>   case hello_request: HelloRequest;
>   case client_hello:  ClientHello;
>   case hello_verify_request: HelloVerifyRequest;  // New type
>   case server_hello:  ServerHello;
>   case certificate:Certificate;
>   case server_key_exchange: ServerKeyExchange;
>   case certificate_request: CertificateRequest;
>   case server_hello_done:ServerHelloDone;
>   case certificate_verify:  CertificateVerify;
>   case client_key_exchange: ClientKeyExchange;
>   case finished: Finished;
> } body;
>   } Handshake;
> 
> Corrected Text
> --
>   struct {
> HandshakeType msg_type;
> uint24 length;
> uint16 message_seq;   // New field
> uint24 fragment_offset;   // New field
> uint24 fragment_length;   // New field
> select (HandshakeType) {
>   case hello_request: HelloRequest;
>   case client_hello:  ClientHello;
>   case server_hello:  ServerHello;
>   case hello_verify_request: HelloVerifyRequest;  // New field
>   case certificate:Certificate;
>   case server_key_exchange: ServerKeyExchange;
>   case certificate_request: CertificateRequest;
>   case server_hello_done:ServerHelloDone;
>   case certificate_verify:  CertificateVerify;
>   case client_key_exchange: ClientKeyExchange;
>   case finished: Finished;
> } body; } Handshake;
> 
> Notes
> -
> Change the order of cases inside select field to keep it:
> 1. In ascending order
> 2. Consistent with the structure in 4.3.2
> 
> Instructions:
> -
> This erratum is currently posted as "Reported". (If it is spam, it 
> will be removed shortly by the RFC Production Center.) Please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> will log in to change the status and edit the report, if necessary.
> 
> --
> RFC6347 (draft-ietf-tls-rfc4347-bis-06)
> --
> Title   : Datagram Transport Layer Security Version 1.2
> Publication Date: January 2012
> Author(s)   : E. Rescorla, N. Modadugu
> Category: PROPOSED STANDARD
> Source  : Transport Layer Security
> Stream  : IETF
> Verifying Party : IESG
> 

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS]Re: Consensus call for RFC8773bis Formal Analysis Requirement

2024-08-23 Thread Ben Smyth
On Fri, 23 Aug 2024, 19:30 Joseph Salowey,  wrote:

> Please respond to the list with a brief reason why you think the document
> requires formal analysis or not. This call will end on September 16, 2024.
>

What's the goal?

Security guarantees: Do the work.
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS]tls - New Meeting Session Request for IETF 121

2024-08-23 Thread IETF Meeting Session Request Tool


A new meeting session request has just been submitted by Deirdre Connolly, a
Chair of the TLS Working Group.


-
Working Group Name: Transport Layer Security
Area Name: Security Area
Session Requester: Deirdre Connolly


Number of Sessions: 1
Length of Session(s): 2 Hours
Number of Attendees: 120
Conflicts to Avoid: 
 Chair conflict: wish masque emu mls pearg privacypass dult cfrg wimse
 Technology overlap: quic lamps lake dnsop dprive cfrg oauth cfrg
 Key participant conflict: ppm maprg gendispatch privacypass webtrans saag 
secdispatch httpbis ohai cfrg

   
 Can't meet: Friday morning, Friday early afternoon, Friday late afternoon

Participants who must be present:
  Eric Rescorla

Resources Requested:

Special Requests:
  Please don't conflict with the WIMSE BOF
-


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS]Re: [Editorial Errata Reported] RFC6347 (8089)

2024-08-23 Thread Eric Rescorla
I don't think this is an erratum. I agree it would be better, but I don't
think that rises to "error".

-Ekr


On Fri, Aug 23, 2024 at 11:17 AM Rebecca VanRheenen 
wrote:

> Hi Paul,
>
> We are unable to verify this erratum that the submitter marked as
> editorial, so we changed the Type to “Technical”. As Stream Approver,
> please review and set the Status and Type accordingly (see the definitions
> at https://www.rfc-editor.org/errata-definitions/).
>
> Notes:
> * RFC 6347 has been obsoleted by RFC 9147. We see similar blocks of code
> in Section 5.2 and Appendix A.2 of RFC 9147.
> * For information about errata on obsolete RFCs, see #7 in the IESG
> Statement on "IESG Processing of RFC Errata for the IETF Stream” (
> https://datatracker.ietf.org/doc/statement-iesg-iesg-processing-of-rfc-errata-for-the-ietf-stream-20210507/
> ).
>
> You may review the report at:
> https://www.rfc-editor.org/errata/eid8089
>
> Information on how to verify errata reports can be found at:
> https://www.rfc-editor.org/how-to-verify/
>
> Further information on errata can be found at:
> https://www.rfc-editor.org/errata.php
>
> Best regards,
> RFC Editor/rv
>
>
> > On Aug 23, 2024, at 6:26 AM, RFC Errata System <
> rfc-edi...@rfc-editor.org> wrote:
> >
> > The following errata report has been submitted for RFC6347,
> > "Datagram Transport Layer Security Version 1.2".
> >
> > --
> > You may review the report below and at:
> > https://www.rfc-editor.org/errata/eid8089
> >
> > --
> > Type: Editorial
> > Reported by: Kamil Milewski 
> >
> > Section: 4.2.2
> >
> > Original Text
> > -
> >   struct {
> > HandshakeType msg_type;
> > uint24 length;
> > uint16 message_seq;   // New field
> > uint24 fragment_offset;   // New field
> > uint24 fragment_length;   // New field
> > select (HandshakeType) {
> >   case hello_request: HelloRequest;
> >   case client_hello:  ClientHello;
> >   case hello_verify_request: HelloVerifyRequest;  // New type
> >   case server_hello:  ServerHello;
> >   case certificate:Certificate;
> >   case server_key_exchange: ServerKeyExchange;
> >   case certificate_request: CertificateRequest;
> >   case server_hello_done:ServerHelloDone;
> >   case certificate_verify:  CertificateVerify;
> >   case client_key_exchange: ClientKeyExchange;
> >   case finished: Finished;
> > } body;
> >   } Handshake;
> >
> > Corrected Text
> > --
> >   struct {
> > HandshakeType msg_type;
> > uint24 length;
> > uint16 message_seq;   // New field
> > uint24 fragment_offset;   // New field
> > uint24 fragment_length;   // New field
> > select (HandshakeType) {
> >   case hello_request: HelloRequest;
> >   case client_hello:  ClientHello;
> >   case server_hello:  ServerHello;
> >   case hello_verify_request: HelloVerifyRequest;  // New field
> >   case certificate:Certificate;
> >   case server_key_exchange: ServerKeyExchange;
> >   case certificate_request: CertificateRequest;
> >   case server_hello_done:ServerHelloDone;
> >   case certificate_verify:  CertificateVerify;
> >   case client_key_exchange: ClientKeyExchange;
> >   case finished: Finished;
> > } body; } Handshake;
> >
> > Notes
> > -
> > Change the order of cases inside select field to keep it:
> > 1. In ascending order
> > 2. Consistent with the structure in 4.3.2
> >
> > Instructions:
> > -
> > This erratum is currently posted as "Reported". (If it is spam, it
> > will be removed shortly by the RFC Production Center.) Please
> > use "Reply All" to discuss whether it should be verified or
> > rejected. When a decision is reached, the verifying party
> > will log in to change the status and edit the report, if necessary.
> >
> > --
> > RFC6347 (draft-ietf-tls-rfc4347-bis-06)
> > --
> > Title   : Datagram Transport Layer Security Version 1.2
> > Publication Date: January 2012
> > Author(s)   : E. Rescorla, N. Modadugu
> > Category: PROPOSED STANDARD
> > Source  : Transport Layer Security
> > Stream  : IETF
> > Verifying Party : IESG
> >
>
>
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org