Re: [TLS] Security review of TLS1.3 0-RTT

2017-05-04 Thread Derrell Piper
Sure, those are fine weasel words.  But do we really want to allow into this 
protocol something that can be misused with security implications in a protocol 
that’s attempting to solve a security problem?  I really don’t know.  I’m 
inclined to say, ‘no’ though.  For all those same reasons that IPsec provides 
replay detection, I think TLS should too.

Derrell

> On May 4, 2017, at 4:00 PM, Erik Nygren  wrote:
> 
> "The onus is on clients not to send messages in 0-RTT data which are not safe 
> to have replayed and which they would not be willing to retry across multiple 
> 1-RTT connections. The onus is on servers to protect themselves against 
> attacks employing 0-RTT data replication."
> 
> The server responsibility is a general property TLS can maintain while the 
> client responsibility requires an application profile to define.  

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Idempotency and the application developer

2017-05-04 Thread Derrell Piper

> On May 4, 2017, at 5:35 PM, Watson Ladd  wrote:
> 
> 0-RTT is opt-in per protocol

…and at the end of the day, that’s the only reason I’d agree to this.

Derrell
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] datacenter TLS decryption as a three-party protocol

2017-07-19 Thread Derrell Piper

> On Jul 19, 2017, at 6:02 PM, Yoav Nir  wrote:
> 
> At the very least, a standards-track multi-party protocol like that can be 
> something that standards like PCI, HIPAA and others can latch on to and say 
> “Do TLS 1.3 without backdoors unless you really need to and in that case use 
> *this*”.
> 
> That is better guidance than “Do TLS 1.3 without backdoors, unless you really 
> need to and in that case do whatever works for you”

Yes, that’s what I would like to see after today’s meeting too.___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls