[TLS] Re: Question to draft-ietf-tls-esni 6.2.1.

2025-03-12 Thread Christopher Patton
You might be interested in the draft being discussed here (I believe this
is on the agenda for next week as well):
https://mailarchive.ietf.org/arch/msg/tls/dT5e5F1yWtFbs0dpESsWO-Cg0AM/

There's also this draft, which could be used to probe servers for ECH
support: https://datatracker.ietf.org/doc/html/draft-ietf-tls-wkech-05

Best,
Chris P.


On Tue, Mar 11, 2025 at 3:30 AM 风扇 滑翔翼  wrote:

> Due to the existence of GREASE ECH, for requests made by clients that have
> implemented ECH but do not have a suitable ECH Config, the server always
> fails to decrypt and can choose to send retry config.
> Why not treat this an opportunity to upgrade Plaintext Hello to ECH(if
> certificate verification succeed), but require the client to ignore it?
> Will this lead to a possible vulnerability?
> At present, the initial distribution of ECH Config can only be done
> through DNS. Can't it uses methods similar to mentioned earlier to remind
> clients of potential upgrades?
> ___
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: draft-ietf-tls-trust-anchor-ids-00

2025-03-12 Thread David Benjamin
Hi Luke! Thanks for the thoughts!

I don't remember if there was a particular reason originally, probably just
an artifact of them being in separate sections. :-) Reusing it makes sense,
although there are some differences here:

Regarding mismatching signatures and whatnot, the original thinking with
the EncryptedExtensions retry was that the server would filter the list
down based on all its other selection criteria. If the server knows the
client doesn't support ECDSA, there is no point in saying you have a trust
anchor that has only signed an ECDSA key. The server already has all that
information available by way of the ClientHello. But it looks like we
half-forgot to write that. (Half because there's one sentence that only
makes sense if the text were there, but the text itself is missing.) I
filed a bug to track this:
https://github.com/tlswg/tls-trust-anchor-ids/issues/97

Assuming the WG ends up sticking with that design, that should avoid the
sigalg issues described in Section 5.3, but not things being out of sync if
you got routed to a different server instance. In that case, yeah, I could
see the client wanting to offer a couple of them a la Section 5.3. (Though
there are other ways to solve this, including the client trying a couple
times or an in-handshake retry. This is basically the same problem space as
in the ECH retry, except that we can offer multiple and ECH cannot.)

If we go with the client offering multiple options, there is an added input
to the procedure: did the client like the *particular certificate* that the
server already presented? If not, the client may want to specifically
exclude that trust anchor in the retry and use this mechanism as a way to
iterate over what the server has. This can be useful in corner cases when
the client imposes custom policies like SCTNotAfter[0] or name-constraining
a trust anchor, e.g. as part of a partial distrust. While those are broadly
invisible, you can hit a corner case if *all* of the following happen:
- The client has put some trust anchor under a constraint
- The server has some certificate A from the trust anchor that breaks the
constraint (and is thus not useful to the client)
- But certificate A may be useful to some *other* client (e.g. an older
one), which is why the server still wants to keep getting certs from the
trust anchor for now. (I'm very interested in helping server operators
de-risk configuration changes as PKIs evolve, and being able to retain your
previous cert profile while transitioning in your new one helps do that.)
- The server has some certificate B from some other trust anchor that would
satisfy the client
- For some reason, when offered both, the server picked A instead of B

In that case, the client might say "well, you have A and B available, but
you gave me A and I see now that that is unacceptable, let me try again
asking just for B". The retry mechanism then lets you repair mishaps in
these kinds of complicated corner cases that can arise, without the
complexity of encoding the ad-hoc policies into the protocol. Of course,
the cost is that we repair mishaps with an expensive retry, but as long as
these are exceptional cases, I think that's fine.

To that end, the client here might want to tweak the Section 5.3 behavior
where, if it sees two trust anchors in DNS, one of which it has constrained
and another which it has not, it may wish to only ask for the unconstrained
one to direct the server to pick the one that's more likely to be
acceptable. I.e. only request constrained trust anchors as a last resort.
That should avoid the retry most of the time. The server adjusting its
preference order to put B over A would also avoid it.

(This allowance wasn't actually an original design goal, rather a happy
accident that fell out of inverted selection order. We then also got
feedback from another client that this sort of thing was useful for
something else they were doing, though I don't know the specific details
and wouldn't want to speak on their behalf.)

Anyway, clearly the draft should give some more guidance here. To go full
circle, more guidance means more reason to share the underlying text
sections so we don't have to write similar guidance twice. I'll file a bug
referencing this thread to keep track of all this. :-)

David

[0] https://dadrian.io/blog/posts/sct-not-after/


On Tue, Mar 11, 2025 at 11:10 AM Luke T2  wrote:

> Hey David,
>
> Thanks for the draft! I had some thoughts about how Relying Parties build
> their list of Trust Anchor IDs to send to the Authenticating Parties. In
> the draft currently there is different behaviour by the Relying Party
> depending on whether it is a retry connection or not.
> When a relying party receives the tls-trust-anchors in the DNS Service
> Parameter they compute the intersection of the received trust anchors with
> their configured trust anchors, then they use that information to determine
> their trust_anchors list - in this case relying parties should offer

[TLS] Publication has been requested for draft-ietf-tls-hybrid-design-12

2025-03-12 Thread Joseph Salowey via Datatracker
Joseph Salowey has requested publication of draft-ietf-tls-hybrid-design-12 as 
Informational on behalf of the TLS working group.

Please verify the document's state at 
https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: WG Adoption Call for Post-Quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

2025-03-12 Thread Loganaden Velvindron
On Sat, 1 Mar 2025 at 00:22, Stephen Farrell  wrote:
>
>
> Hiya,
>
> On 28/02/2025 18:56, Sean Turner wrote:
> > In response to the WG adoption call, Dan Bernstein pointed out some
> > potential IPR (see [0]), but no IPR disclosure has been made in
> > accordance with BCP 79.
>
> While I don't think the lack of an IPR declaration is fatal
> here, I do think it'd be great if that uncertainty could be
> reduced. I think I saw that Russ tried to reach out to one
> of the possible patent holders to ask if they'd be willing
> to make a declaration. I've no idea where that's at, but I'd
> encourage the TLS chairs and SEC ADs to see if they can help
> get that to happen as reducing uncertainty would be good and
> if we can't, then this topic will just keep cropping up and
> Dan is not the only person I've heard express concerns in
> this regard.
>

I agree with Dr Stephen on this one. It would help if we can get
declarations from
patent holders early.

For example, OpenSSH implemented DSA as there was less risk of patents:

"
The second major variety of SSH is the SSH 2 protocol. SSH 2 was
invented to avoid the patent issues regarding RSA (patent issues which
no longer apply, since the patent has expired), to fix the CRC data
integrity problem that SSH1 has, and for a number of other technical
reasons. By requiring only the asymmetric DSA and DH algorithms,
protocol 2 avoids all patents.
"

If there is any risk of a patent, can we look at a backup choice for
ML-KEM in TLS,
especially for implementers who are very patent averse ?

Should I start a new thread ?






> Cheers,
> S.
>
> PS: I do realise we can't force someone to make an IPR
> declaration.
>
> ___
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (IANA Registry Updates for TLS and DTLS) to Proposed Standard

2025-03-12 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'IANA Registry Updates for TLS and DTLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-04-09. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Re: Question to draft-ietf-tls-esni 6.2.1.

2025-03-12 Thread Stephen Farrell


Hiya,

On 12/03/2025 23:25, Christopher Patton wrote:

There's also this draft, which could be used to probe servers for ECH
support:https://datatracker.ietf.org/doc/html/draft-ietf-tls-wkech-05


Just on the status of the wkech draft - we're playing about
with (re-)implementing that using python now that we have a
PoC ECH integration with cpython [1], so there's nothing to
report in terms of the draft content this time, but should
be in the not too distant future.

If the WG want to make other use(s) of the mechanism as part
of addressing this question, that'd be fine.

Cheers,
S.

[1] 
https://github.com/defo-project/ech-dev-utils/blob/main/howtos/cpython.md




OpenPGP_signature.asc
Description: OpenPGP digital signature
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org