[TLS] Last Call: (A TLS ClientHello padding extension) to Proposed Standard

2015-08-10 Thread The IESG

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'A TLS ClientHello padding extension'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-08-24. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This memo describes a TLS extension that can be used to pad
   ClientHello messages to a desired size.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-padding/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-padding/ballot/


No IPR declarations have been submitted directly on this I-D.


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'A TLS ClientHello padding extension' to Proposed Standard (draft-ietf-tls-padding-04.txt)

2015-09-08 Thread The IESG
The IESG has approved the following document:
- 'A TLS ClientHello padding extension'
  (draft-ietf-tls-padding-04.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working
Group.

The IESG contact persons are Stephen Farrell and Kathleen Moriarty.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-padding/





Technical Summary

   This memo describes a TLS extension that can be used to pad
   ClientHello messages to a desired size.

Working Group Summary

   This extension was originally introduced to work around a 
   particular vendor's issue.  Its deployment was successful. 
   Since then it has been found that this extension can serve 
   to alleviate issues with issues in several vendor's products.  
   There was good consensus to move forward with this 
   document as it may find further applicability in the future.  

Document Quality

  There are multiple interoperable implementations (web 
   browsers and web servers) of this extension deployed today.  
   It works well to solve the problem.

Personnel

  Document shepherd is Joseph Salowey
  The irresponsible area director is Stephen Farrell

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Transport Layer Security (TLS) Cached Information Extension) to Proposed Standard

2015-11-20 Thread The IESG

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'Transport Layer Security (TLS) Cached Information Extension'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-12-04. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   Transport Layer Security (TLS) handshakes often include fairly static
   information, such as the server certificate and a list of trusted
   certification authorities (CAs).  This information can be of
   considerable size, particularly if the server certificate is bundled
   with a complete certificate chain (i.e., the certificates of
   intermediate CAs up to the root CA).

   This document defines an extension that allows a TLS client to inform
   a server of cached information, allowing the server to omit already
   available information.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-cached-info/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-cached-info/ballot/


No IPR declarations have been submitted directly on this I-D.

RFC 4634 has been obsoleted by RFC 6234. We'll fix the reference
later.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Importing External PSKs for TLS) to Proposed Standard

2020-10-01 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Importing External PSKs for TLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-10-15. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes an interface for importing external Pre-
   Shared Keys (PSKs) into TLS 1.3.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-external-psk-importer/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Exported Authenticators in TLS) to Proposed Standard

2020-10-02 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Exported Authenticators in TLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-10-16. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes a mechanism in Transport Layer Security (TLS)
   for peers to provide a proof of ownership of an identity, such as an
   X.509 certificate.  This proof can be exported by one peer,
   transmitted out-of-band to the other peer, and verified by the
   receiving peer.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Deprecating MD5 and SHA-1 signature hashes in TLS 1.2) to Proposed Standard

2020-10-14 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Deprecating MD5 and SHA-1 signature
hashes in TLS 1.2'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-10-28. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   The MD5 and SHA-1 hashing algorithms are steadily weakening in
   strength and their deprecation process should begin for their use in
   TLS 1.2 digital signatures.  However, this document does not
   deprecate SHA-1 in HMAC for record protection.  This document updates
   RFC 5246 and RFC 7525.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-md5-sha1-deprecate/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Deprecating TLSv1.0 and TLSv1.1) to Best Current Practice

2020-11-09 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Deprecating TLSv1.0 and TLSv1.1'
   as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-11-30. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document, if approved, formally deprecates Transport Layer
   Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346).
   Accordingly, those documents (will be moved|have been moved) to
   Historic status.  These versions lack support for current and
   recommended cryptographic algorithms and mechanisms, and various
   government and industry profiles of applications using TLS now
   mandate avoiding these old TLS versions.  TLSv1.2 has been the
   recommended version for IETF protocols since 2008, providing
   sufficient time to transition away from older versions.  Removing
   support for older versions from implementations reduces the attack
   surface, reduces opportunity for misconfiguration, and streamlines
   library and product maintenance.

   This document also deprecates Datagram TLS (DTLS) version 1.0
   (RFC6347), but not DTLS version 1.2, and there is no DTLS version
   1.1.

   This document updates many RFCs that normatively refer to TLSv1.0 or
   TLSv1.1 as described herein.  This document also updates the best
   practices for TLS usage in RFC 7525 and hence is part of BCP195.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc5024: ODETTE File Transfer Protocol 2.0 (Informational - Independent 
Submission Editor stream)
rfc5024: ODETTE File Transfer Protocol 2.0 (Informational - Independent 
Submission Editor stream)
rfc5023: The Atom Publishing Protocol (Proposed Standard - IETF stream)
rfc5019: The Lightweight Online Certificate Status Protocol (OCSP) Profile 
for High-Volume Environments (Proposed Standard - IETF stream)
rfc5019: The Lightweight Online Certificate Status Protocol (OCSP) Profile 
for High-Volume Environments (Proposed Standard - IETF stream)
rfc5018: Connection Establishment in the Binary Floor Control Protocol 
(BFCP) (Proposed Standard - IETF stream)
rfc4992: XML Pipelining with Chunks for the Internet Registry Information 
Service (Proposed Standard - IETF stream)
rfc4992: XML Pipelining with Chunks for the Internet Registry Information 
Service (Proposed Standard - IETF stream)
rfc4976: Relay Extensions for the Message Sessions Relay Protocol (MSRP) 
(Proposed Standard - IETF stream)
rfc4975: The Message Session Relay Protocol (MSRP) (Proposed Standard - 
IETF stream)
rfc4975: The Message Session Relay Protocol (MSRP) (Proposed Standard - 
IETF stream)
rfc4964: The P-Answer-State Header Extension to the Session Initiation 
Protocol for the Open Mobile Alliance Push to Talk over Cellular (Informational 
- IETF stream)
rfc4964: The P-Answer-State Header Extension to the Session Initiation 
Protocol for the Open Mobile Alliance Push to Talk over Cellular (Informational 
- IETF stream)
rfc4851: The Flexible Authentication via Secure Tunneling Extensible 
Authentication Protocol Method (EAP-FAST) (Informational - IETF stream)
rfc4851: The Flexible Authentication via Secure Tunneling Extensible 
Authentication Protocol Method (EAP-FAST) (Informational - IETF stream)
rfc4823: FTP Transport for Secure Peer-to-Peer Business Data Interchange 
over the Internet (Informational - IETF stream)
rfc4823: FTP Transport for Secure Peer-to-Peer Business Data Interchange 
over the Internet (Informational - IETF stream)
rfc4791: Calendaring Extensions to WebDAV (CalDAV) (Proposed Standard - 
IETF stream)
rfc4791: Calendaring Extensions to WebDAV (CalDAV) (Proposed Standard - 
IETF stream)
rfc4785: Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for 
Transport Layer Security (TLS) (Proposed Standard - IETF stream)
rfc4785: Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for 
Transport Layer Security (TLS) (Proposed Standard - IETF stream)
rfc4744: Using the NETCONF Protocol over the Blocks Extensible Exchange 
Protocol (BEEP) (Historic - IETF stream)
rfc4744: Using the NETCONF Protocol over the Blocks Extensible Exchange 
Protocol (BEEP) (Historic - IETF stream)
rfc4743: Using NETCONF over the Simple Object Access Protocol (SOAP) 
(Historic - IETF stream)
rfc4743: Using NETCONF over the Simple Object Access Protocol (SOAP) 
(Historic - IETF stream)
rfc4732: Internet Denial-of-Service Considerations (Inf

[TLS] Last Call: (TLS Ticket Requests) to Proposed Standard

2020-11-19 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS Ticket Requests'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-12-03. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   TLS session tickets enable stateless connection resumption for
   clients without server-side, per-client, state.  Servers vend an
   arbitrary number of session tickets to clients, at their discretion,
   upon connection establishment.  Clients store and use tickets when
   resuming future connections.  This document describes a mechanism by
   which clients can specify the desired number of tickets needed for
   future connections.  This extension aims to provide a means for
   servers to determine the number of tickets to generate in order to
   reduce ticket waste, while simultaneously priming clients for future
   connection attempts.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-ticketrequests/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Deprecating TLSv1.0 and TLSv1.1' to Best Current Practice (draft-ietf-tls-oldversions-deprecate-12.txt)

2021-01-25 Thread The IESG
The IESG has approved the following document:
- 'Deprecating TLSv1.0 and TLSv1.1'
  (draft-ietf-tls-oldversions-deprecate-12.txt) as Best Current Practice

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/





Technical Summary

This document formally deprecates Transport Layer Security (TLS)
versions 1.0 [RFC2246], TLS 1.1 [RFC4346], and DTLS 1.0 [RFC4347].
It moves these documents to the historic state.  The draft is intended
for BCP because it updates 7525 and hence should be part of BCP195.

Working Group Summary

When this draft was first presented at IETF 102, there was
discussion about waiting to request publication until the
TLSv1.0 and TLSv1.1 use rates to drop to an “acceptable”
level.  There were others that felt that there was no need to
wait and that the IETF should do what it thinks is right with
its protocols.  The WG, obviously, settled on progressing this
draft.  Note this draft was further discussed at IETF 103 and
104 to resolve comments received.

There was also some discomfort from enterprise users who
were concerned about the time and expense needed to
transition to newer versions.  It should be noted that library
support typically continues for years beyond the publication
date of the RFC, e.g., OpenSSL released in Fall 2018 will
support TLSv1.0 and TLSv1.1 for roughly another 4 years.

The WGLC  [0] did produce some fireworks.  One participant
very strongly believes that “Disabling TLSv1.0 will only result
in lots of interop failures and pain, but no improvement in
security”.  The assertion was that the use of (RSA,MD) and
(RSA,SHA-1) is allowed in TLS 1.2.  This comment resulted in
draft-lvelvindron-tls-md5-sha1-deprecate, which deprecates
the use of MD5 and SHA1 in TLS1.2.  The chairs determined
that this draft could proceed without the MD5/SHA1 deprecation
text as it is contained in another draft [1].

IETF LC also added two RFCs to the updates list and more
importantly a section was added to address operational
considerations.

[0] Link to WGLC thread:
https://mailarchive.ietf.org/arch/msg/tls/cupb-OgiSK1ulpRANAbihPHc7zI
[1] Link to chair msg:
https://mailarchive.ietf.org/arch/msg/tls/xyMXqKQUZeztD5WupvI0uBp4OLA

Document Quality

The document got a great deal of review from many people.
The list of documents updated was produced mechanically with a
script and is believed to be accurate and complete.
Implementations have started picking up the guidance to greater
and lesser extent, but the only interoperability considerations are
expected to be those listed in the operational considerations section
of the document, since the change is just to remove support (whether
entirely or by default) for the older protocol versions.

Personnel

The document shepherd is Sean Turner.
The Area Director is Benjamin Kaduk.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'TLS Ticket Requests' to Proposed Standard (draft-ietf-tls-ticketrequests-07.txt)

2021-02-01 Thread The IESG
The IESG has approved the following document:
- 'TLS Ticket Requests'
  (draft-ietf-tls-ticketrequests-07.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-ticketrequests/




Technical Summary

This document defines a TLS extension that clients can use to inform servers
about the desired number of tickets to generate, in order to reduce ticket waste
while simultaneously letting clients prepare for future connection attempts.

Working Group Summary

The draft had a fairly quiet existence until the -02 version, which was 
also the version where the authors requested the chairs request WGLC.
The WGLC and two issue-specific consensus calls that followed were all
fairly contentious.  The WGLC and the two issue-specific consensus calls
resulted in changes to the draft: the count field was renamed
new_session_count, a new counter called resumption_count was added, and 
text was added to address racing pre-conditions.  The addition of the
second counter acknowledged that resumption is different and can
tolerate the complexity of the additional counter. What was not added
was text to address ticket reuse use cases; RFC 8446 indicates "clients
SHOULD NOT reuse a ticket for multiple connections". One of the
issue-specific consensus calls about this was about this point and there
was no consensus to add text to address this use case.

The consensus should probably be characterized as rough. This is because
it seems that that the same people that supported adopting the draft
support publishing the mechanism, but there are differences in how far
participants believe the mechanism should go in supporting ticket reuse.

Document Quality

Due to the controversial nature of the discussion of ticket reuse,
essentially all the text in this document received careful review from
many WG participants.  It should be of high quality, though to my
knowledge implementors wanted to wait until the controversy was
settled (i.e., by publication) before implementing.

Personnel

Sean Turner is the Shepherd.
Ben Kaduk is the Area Director.



RFC Editor Note

  Please ensure that the current (RFC 8174) form of BCP 14 boilerplate is used.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (The Datagram Transport Layer Security (DTLS) Protocol Version 1.3) to Proposed Standard

2021-02-08 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The Datagram Transport Layer Security
(DTLS) Protocol Version 1.3'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-02-22. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies Version 1.3 of the Datagram Transport Layer
   Security (DTLS) protocol.  DTLS 1.3 allows client/server applications
   to communicate over the Internet in a way that is designed to prevent
   eavesdropping, tampering, and message forgery.

   The DTLS 1.3 protocol is intentionally based on the Transport Layer
   Security (TLS) 1.3 protocol and provides equivalent security
   guarantees with the exception of order protection/non-replayability.
   Datagram semantics of the underlying transport are preserved by the
   DTLS protocol.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-dtls13/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc8439: ChaCha20 and Poly1305 for IETF Protocols (Informational - IRTF 
Stream)




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Connection Identifiers for DTLS 1.2) to Proposed Standard

2021-03-08 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Connection Identifiers for DTLS 1.2'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-03-28. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies the Connection ID (CID) construct for the
   Datagram Transport Layer Security (DTLS) protocol version 1.2.

   A CID is an identifier carried in the record layer header that gives
   the recipient additional information for selecting the appropriate
   security association.  In "classical" DTLS, selecting a security
   association of an incoming DTLS record is accomplished with the help
   of the 5-tuple.  If the source IP address and/or source port changes
   during the lifetime of an ongoing DTLS session then the receiver will
   be unable to locate the correct security context.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-dtls-connection-id/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'The Datagram Transport Layer Security (DTLS) Protocol Version 1.3' to Proposed Standard (draft-ietf-tls-dtls13-43.txt)

2021-05-03 Thread The IESG
The IESG has approved the following document:
- 'The Datagram Transport Layer Security (DTLS) Protocol Version 1.3'
  (draft-ietf-tls-dtls13-43.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-dtls13/




Technical Summary

This document defines the DTLS 1.3 protocol, which is intentionally
based on the Transport Layer Security (TLS) 1.3 protocol.  DTLS 1.3
provides equivalent as with TLS 1.3 security guarantees with the
exception of order protection/non-replayability.

Working Group Summary

This draft has been discussed at length on the mailing list and at numerous
IETF meetings.  As DTLS is based on TLS, much of the discussion already
occurred before work began in earnest.  The  DTLS-specific issues, e.g.,
adding the ACK content type, KeyUpdate mechanism, and DTLS key separation,
were discussed both on the mailing list and the at IETF meetings.  There is
broad consensus to publish this document.

Document Quality

This document has seen extensive review in the WG and is believed
to be high quality.
The major TLS implementations are expected to implement it if they
have not done so already.

Personnel

Sean Turner is the Document Shepherd.
Ben Kaduk is the AD.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Connection Identifiers for DTLS 1.2' to Proposed Standard (draft-ietf-tls-dtls-connection-id-13.txt)

2021-06-22 Thread The IESG
The IESG has approved the following document:
- 'Connection Identifiers for DTLS 1.2'
  (draft-ietf-tls-dtls-connection-id-13.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-dtls-connection-id/




Technical Summary

   This document specifies the Connection ID (CID) construct for the
   Datagram Transport Layer Security (DTLS) protocol version 1.2.

   A CID is an identifier carried in the record layer header that gives
   the recipient additional information for selecting the appropriate
   security association.  In "classical" DTLS, selecting a security
   association of an incoming DTLS record is accomplished with the help
   of the 5-tuple.  If the source IP address and/or source port changes
   during the lifetime of an ongoing DTLS session then the receiver will
   be unable to locate the correct security context.  An explicit CID allows
   for the DTLS association to persist across such address/port changes.

Working Group Summary

The document is of interest to a subset of the working group 
participants.  The participants are active and there is general 
working group consensus behind the document.  

Document Quality

The document has been reviewed by people implementing 
the protocol.  There are multiple implementations of this 
an earlier version of extension, and the current version has
also been implemented.

Personnel

The Document Shepherd is Joseph Salowey and the responsible AD is Ben Kaduk

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Deprecating MD5 and SHA-1 signature hashes in (D)TLS 1.2' to Proposed Standard (draft-ietf-tls-md5-sha1-deprecate-09.txt)

2021-09-27 Thread The IESG
The IESG has approved the following document:
- 'Deprecating MD5 and SHA-1 signature hashes in (D)TLS 1.2'
  (draft-ietf-tls-md5-sha1-deprecate-09.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-md5-sha1-deprecate/





Technical Summary

   The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to
   attack and this document deprecates their use in TLS 1.2 digital
   signatures.  However, this document does not deprecate SHA-1 in HMAC
   for record protection.  This document updates RFC 5246.

Working Group Summary

* There is strong support in the working group for this document.  Primary 
items during WGLC was around the consistency of the normative language.

* Discussion from AD Review and IETC LC saw the streamlining of the update 
guidance to RFC5246 and dropping an formal update to RFC7525 (as it is being 
revised).

Document Quality

* There was review from the WG, comments from the IETF LC and Directorates (in 
particular IoTDIR) were addressed.

Personnel

Document Shepherd = Sean Turner

Responsible AD = Roman Danyliw

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Guidance for External PSK Usage in TLS) to Informational RFC

2021-10-29 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Guidance for External PSK Usage in TLS'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-11-19. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document provides usage guidance for external Pre-Shared Keys
   (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446.
   This document lists TLS security properties provided by PSKs under
   certain assumptions, and then demonstrates how violations of these
   assumptions lead to attacks.  This document discusses PSK use cases
   and provisioning processes.  This document provides advice for
   applications to help meet these assumptions.  This document also
   lists the privacy and security properties that are not provided by
   TLS 1.3 when external PSKs are used.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-external-psk-guidance/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Document Action: 'Guidance for External PSK Usage in TLS' to Informational RFC (draft-ietf-tls-external-psk-guidance-05.txt)

2022-02-03 Thread The IESG
The IESG has approved the following document:
- 'Guidance for External PSK Usage in TLS'
  (draft-ietf-tls-external-psk-guidance-05.txt) as Informational RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-external-psk-guidance/





Technical Summary

This document was born from a DT (Design Team) formed after discussions
at IETF 106 about draft-ietf-tls-external-psk-importer made it clear that some
guidance was needed with respect to PSK (Pre-Shared Key) usage.  It summarizes
known use cases and risks, and offers guidance on using PSKs securely in TLS.

Working Group Summary

The DT was comprised of the following participants: Benjamin Beurdouche,
Bjoern Haase, Christopher Wood, Colm MacCarthaigh, Eric Rescorla, Jonathan 
Hoyland,
Martin Thomson, Mohamad Badra, Mohit Sethi, Oleg Pekar, Owen Friel,
and Russ Housley. In addition to this powerhouse DT providing input on
the original version of the document, the document was also reviewed by the
following people: Scott Hollenbeck, Jim Schaad, Carrick Bartle, Watson Ladd,
John Mattsson, Ben Smyth, and Jonathan Hammell. The Shepherd has no
concerns whatsoever about the breadth and depth of reviews.

The DT’s output was presented at a virtual interim meeting.  The remainder of 
the discussion occurred on the list.

Document Quality

The document does not specify a protocol per se, but it has been
well reviewed and implementations either implement the guidance or
allow library consumers to do so directly.

Personnel

Sean Turner is the document Shepherd.
Ben Kaduk is the responsible Area Director.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Delegated Credentials for (D)TLS) to Proposed Standard

2022-03-19 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Delegated Credentials for (D)TLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2022-04-08. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   The organizational separation between the operator of a (D)TLS
   endpoint and the certification authority can create limitations.  For
   example, the lifetime of certificates, how they may be used, and the
   algorithms they support are ultimately determined by the
   certification authority.  This document describes a mechanism to to
   overcome some of these limitations by enabling operators to delegate
   their own credentials for use in (D)TLS without breaking
   compatibility with peers that do not support this specification.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-subcerts/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Importing External PSKs for TLS' to Proposed Standard (draft-ietf-tls-external-psk-importer-08.txt)

2022-05-05 Thread The IESG
The IESG has approved the following document:
- 'Importing External PSKs for TLS'
  (draft-ietf-tls-external-psk-importer-08.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-external-psk-importer/





Technical Summary

   This document describes an interface for importing external Pre-
   Shared Keys (PSKs) into TLS 1.3.

Working Group Summary

Since this document addresses some potential security issues in TLS 1.3 there 
was a fair amount of discussion in the working group.  At this point there is 
good consensus for the document within the working group.

Document Quality


There are implementations of the protocol and a number of implementers have 
shown interest.   The document has had review in the context of the "selfie" 
attack which it helps to address. 

Personnel

Document Shepherd is Joe Salowey.  
Responsible Area Director is Roman Danyliw.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Exported Authenticators in TLS' to Proposed Standard (draft-ietf-tls-exported-authenticator-15.txt)

2022-05-10 Thread The IESG
The IESG has approved the following document:
- 'Exported Authenticators in TLS'
  (draft-ietf-tls-exported-authenticator-15.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/





Technical Summary

   This document describes a mechanism in Transport Layer Security (TLS)
   for peers to provide a proof of ownership of an identity, such as an
   X.509 certificate.  This proof can be exported by one peer,
   transmitted out-of-band to the other peer, and verified by the
   receiving peer.

Working Group Summary

As further background, Exported Authenticators (EAs) provide a way for 
endpoints of a TLS connection to prove ownership over multiple identities 
(certificates) outside of TLS. Endpoints can export authenticators to 
applications for transmission and verification. Mechanically, authenticators 
mirror certificate proofs in the TLS handshake, i.e., triggered by an 
authenticator (certificate) request, an endpoint can provide an authenticator 
response  comprised of a certificate, signature, and enveloping MAC 
(Certificate, CertificateVerify, and Finished). Endpoints may encode requests 
and responses using standard TLS encoding rules for transmission at the 
application layer, e.g., within CERTIFICATE_REQUEST and CERTIFICATE HTTP/2 
frames as specified in [1]. Authenticator MACs are computed using keys exported 
from the underlying TLS connection, which means that authenticators are only 
useful to endpoints party to that keying material. As an authentication 
mechanism, EAs provide an alternativ
 e to post-handshake client authentication in TLS 1.3 and renegotiation in TLS 
1.2 (with the extended master secret extension). Moreover, unlike Token 
Binding, which is negotiated via an extension, there is little risk of endpoint 
non-interoperatbility due to non-compliant or extension-stripping middle boxes.

The document author presented the document several times to the WG. Over 50 
emails were exchanged on the draft during its lifecycle in the WG. The group 
waited to move to WGLC until the security review [2] was complete. The document 
went through three WGLCs, with the first leading to non-trivial changes in the 
document before completion. (Some editorial, and some content changes that came 
out of the security review.) There were no objections or blocking issues during 
the second WGLC. The 3rd WGLC addressed changes introduced as a result of a 
secdir review that returned the draft to the WG.

EAs received formal security review from Cas Cremers and Jonathan Hoyland [2] 
(which in turn led to followup work in [3]). EAs guarantee compound 
authentication, i.e., proof of multiple separate identities, bound to a single 
TLS connection against an attacker without access to certificate private keys 
or TLS secrets. 

The intended status is Standards Track, given its use for HTTP/2 Secondary 
Certificates [1]. The document has received ample review from the WG members, 
as well as discussion in the httpbis working group with respect to its use in 
Secondary Certificates.


[1] https://tools.ietf.org/html/draft-ietf-httpbis-http2-secondary-certs-03 
[2] 
https://datatracker.ietf.org/meeting/101/materials/slides-101-tls-sessa-exported-authenticators-security-analysis-00.pdf
[3] 
https://tools.ietf.org/html/draft-hoyland-tls-layered-exported-authenticator-00

Document Quality

EAs have been implemented by at least two independent parties. To the best of 
our knowledge, no browser has yet implemented the mechanism yet.

See [2] for formal security reviews.

Personnel

Sean Turner is the document shepherd

Roman Danyliw is the responsible AD.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Delegated Credentials for (D)TLS' to Proposed Standard (draft-ietf-tls-subcerts-15.txt)

2022-10-03 Thread The IESG
The IESG has approved the following document:
- 'Delegated Credentials for (D)TLS'
  (draft-ietf-tls-subcerts-15.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-subcerts/





Technical Summary

The organizational separation between operators of TLS and DTLS
endpoints and the certification authority can create limitations.
For example, the lifetime of certificates, how they may be used, and
the algorithms they support are ultimately determined by the
certification authority.  This document describes a mechanism to 
overcome some of these limitations by enabling operators to delegate
their own credentials for use in TLS and DTLS without breaking
compatibility with peers that do not support this specification.
 
Working Group Summary

There is good consensus for this document with the working group. There was
some delay in getting issues addressed from the previous WGLC and a delay in
publishing a revised draft with the required changes.  There is interest in the
working group to see this document move forward.

Document Quality

Several vendors have indicated they will support the draft and more than one
implementation exists.  There are test vectors available for the draft, but the
authors and chairs decided to wait until they are verified before including
them in the draft.

Personnel

Joe Salowey is the document Shepherd.
Paul Wouters is the Responsible Area Director.
The IANA Expert(s) for the registries in this document are Yoav Nir, Rich Salz, 
Nick Sullivan.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (A DANE Record and DNSSEC Authentication Chain Extension for TLS) to Proposed Standard

2018-01-24 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'A DANE Record and DNSSEC Authentication
Chain Extension for TLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-02-07. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This draft describes a new TLS extension for transport of a DNS
   record set serialized with the DNSSEC signatures needed to
   authenticate that record set.  The intent of this proposal is to
   allow TLS clients to perform DANE authentication of a TLS server
   without needing to perform additional DNS record lookups.  It will
   typically not be used for general DNSSEC validation of TLS endpoint
   names.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-dnssec-chain-extension/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-dnssec-chain-extension/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (IANA Registry Updates for TLS and DTLS) to Proposed Standard

2018-02-15 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'IANA Registry Updates for TLS and DTLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-03-01. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document describes a number of changes to (D)TLS IANA registries
   that range from adding notes to the registry all the way to changing
   the registration policy.  These changes were mostly motivated by WG
   review of the (D)TLS-related registries undertaken as part of the
   TLS1.3 development process.  This document updates many (D)TLS RFCs
   (see updates header).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-iana-registry-updates/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-iana-registry-updates/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc5878: Transport Layer Security (TLS) Authorization Extensions 
(Experimental - IETF stream)



___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (The Transport Layer Security (TLS) Protocol Version 1.3) to Proposed Standard

2018-02-15 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The Transport Layer Security (TLS)
Protocol Version 1.3'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-03-01. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/ballot/

The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/2900/



The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc8017: PKCS #1: RSA Cryptography Specifications Version 2.2 
(Informational - IETF stream)



___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] UPDATED Last Call: (The Transport Layer Security (TLS) Protocol Version 1.3) to Proposed Standard

2018-02-16 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The Transport Layer Security (TLS)
Protocol Version 1.3'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-03-02. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/ballot/

The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/2900/



The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc8017: PKCS #1: RSA Cryptography Specifications Version 2.2 
(Informational - IETF stream)
rfc6962: Certificate Transparency (Experimental - IETF stream)
rfc6979: Deterministic Usage of the Digital Signature Algorithm (DSA)
and Elliptic Curve Digital Signature Algorithm (ECDSA) (informational
- Independent Stream)
rfc7539: ChaCha20 and Poly1305 for IETF Protocols (Informational - IRTF stream)
rfc7748: Elliptic Curves for Security (Informational - IRTF stream)
rfc8017: PKCS #1: RSA Cryptography Specifications Version 2.2 (Informational - 
IETF stream)
rfc8032: Edwards-Curve Digital Signature Algorithm (EdDSA) (Informational - 
IRTF stream)


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Record Size Limit Extension for Transport Layer Security (TLS)) to Proposed Standard

2018-02-20 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Record Size Limit Extension for Transport
Layer Security (TLS)'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-03-06. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   An extension to Transport Layer Security (TLS) is defined that allows
   endpoints to negotiate the maximum size of protected records that
   each will send the other.

   This replaces the maximum fragment length extension defined in RFC
   6066.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-record-limit/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-record-limit/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] EXTENDED Last Call: (Record Size Limit Extension for Transport Layer Security (TLS)) to Proposed Standard

2018-02-23 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Record Size Limit Extension for Transport
Layer Security (TLS)'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-03-20. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   An extension to Transport Layer Security (TLS) is defined that allows
   endpoints to negotiate the maximum size of protected records that
   each will send the other.

   This replaces the maximum fragment length extension defined in RFC
   6066.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-record-limit/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-record-limit/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'The Transport Layer Security (TLS) Protocol Version 1.3' to Proposed Standard (draft-ietf-tls-tls13-28.txt)

2018-03-21 Thread The IESG
The IESG has approved the following document:
- 'The Transport Layer Security (TLS) Protocol Version 1.3'
  (draft-ietf-tls-tls13-28.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Kathleen Moriarty and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/




Technical Summary

   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

Working Group Summary

  The document is the work product of the members of the TLS
  WG.  There is strong consensus in the working group for this
  document.  The area that was most controversial was around
  the inclusion of a 0-RTT mode that has different security
  properties than the rest of TLS.  s1.3 lists the major differences
  from TLS1.2, as agreed by the contributors; we do not think
  that the RFC needs to list the changes that occurred between
  each draft.

  The draft has had 3 WGLCs to address various issues and the
  chairs assessment was fair in each of these discussions.  At this
  point there are no known outstanding issue.

  While I personally do not agree with inclusion of 0-RTT because
  there are bound to be successful attacks against the mitigations
  in the future, I do agree with the chair's assessment of the WG
  consensus and am pleased with the additional text on mitigating
  the associated risks with 0-RTT.

Document Quality

  There are over 10 interoperable implementations of the
  protocol from different sources written in different
  languages.  The major web browser vendors and TLS
  libraries vendors have draft implementations or have
  indicated they will support the protocol in the future.  In
  addition to having extensive review in the TLS working
  group, the protocol has received unprecedented security
  review by the academic community.  Several TRON (TLS
  Ready or Not) conferences were held with academic
  community to give them a chance to present their
  findings for TLS.  This has resulted in improvements to
  the protocol.  There was also much consideration and 
  discussion around any contentious points, resolved through
  polls and working group last calls.

  Please note that ID-nits complains about the obsoleted/
  updated RFCs not being listed in the abstract. This is
  intentional because the abstract is now a concise and
  comprehensive overview and is free form citations, as
  per RFC7322.

Personnel

   The Document Shepherd is Sean Turner.
   The responsible AD is Kathleen Moriarty.
   
   The IANA Expert(s) for the registries
   in this document are 
 Yoav Nir , 
 Rich Salz , and 
 Nick Sullivan  .

IANA Note

  This document requests the creation of the TLS SignatureScheme
  Registry with values assigned via Specification Required [RFC8126].

  This document requests the reference for several registries be 
  updated to point to this document.  The registries include:
  - TLS Cipher Suite Registry, updated via via Specification Required [RFC8126]
  - TLS ContentType Registry, future values allocated via Standards Action 
[RFC8126]
  - TLS Alert Registry, future values allocated via Standards Action [RFC8126]
  - TLS HandshakeType Registry, future values allocated via Standards Action 
[RFC8126]
  - TLS ExtensionType Registry, the policy is changed in 
ietf-tls-iana-registry-updates and this will be reflected in version 25 of the 
draft


RFC Editor Note

Please ensure a reference is added prior to final publication for the
text added in section
E.6. PSK Identity Exposure
of draft-ietf-tls-tls13

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'A DANE Record and DNSSEC Authentication Chain Extension for TLS' to Proposed Standard (draft-ietf-tls-dnssec-chain-extension-07.txt)

2018-03-21 Thread The IESG
The IESG has approved the following document:
- 'A DANE Record and DNSSEC Authentication Chain Extension for TLS'
  (draft-ietf-tls-dnssec-chain-extension-07.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Kathleen Moriarty and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-dnssec-chain-extension/





Technical Summary

   This draft describes a new TLS extension for transport of a DNS
   record set serialized with the DNSSEC signatures needed to
   authenticate that record set.  The intent of this proposal is to
   allow TLS clients to perform DANE authentication of a TLS server
   without needing to perform additional DNS record lookups.  It will
   typically not be used for general DNSSEC validation of TLS endpoint
   names.

Working Group Summary

   There was good support and no controversy on list or in meetings.

Document Quality

   The draft has had a fair amount of review.  I am not aware of 
   implementations as it wasn't reported by the document
   shepherd. 

Personnel

   The document shepherd is Joseph Salowey and the 
   responsible AD is Kathleen Moriarty.

IANA Note

 A new value in the TLS ExtensionsType registry




RFC Editor Note

Please ensure a normative reference is added for NSEC3 in the final publication.
Please ensure Richard Barnes affiliation is corrected from Mozilla to Cisco.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'IANA Registry Updates for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)' to Proposed Standard (draft-ietf-tls-iana-registry-updates-05.txt)

2018-05-25 Thread The IESG
The IESG has approved the following document:
- 'IANA Registry Updates for Transport Layer Security (TLS) and Datagram
   Transport Layer Security (DTLS)'
  (draft-ietf-tls-iana-registry-updates-05.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-iana-registry-updates/





Technical Summary

This document is not very technical, it's about IANA registries:

   This document describes a number of changes to (D)TLS IANA registries that
range from adding notes to the registry all the way to changing the
registration policy.  These changes were motivated by WG review of the
(D)TLS-related registries undertaken as part of the TLS1.3 development process.
This document updates many (D)TLS RFCs 3749, 5077, 4680, 5246, 5705, 5878,
6520, and 7301.

Working Group Summary

 This draft has been discussed at multiple IETFs most recently at IETF100:
https://datatracker.ietf.org/meeting/100/materials/slides-100-tls-sessa-iana-registry-updates/
 
 There's not been a lot of review because most people consider this
administrivia that others should do; most just want the rules relaxed.  A
couple of notable reviews have been provided as noted below.

The most important change - to loosen registrations while at the same
time adding a "recommended" column to key registries requiring standards
action for a "yes" value, had clear WG consensus.

Various other WG documents depend on these changes being made and more will in
the near future.

Document Quality

This document is essentially administrative, so the important considerations 
are to
ensure consistency amongst it, the TLS 1.3 spec, and the existing registry 
contents,
as well as internal consistency about the handling for various attributes, such 
as the
"Recommended" column, warning notes to be added to registries, and review 
policies.
Martin Thomson and Eric Rescorla have reviewed previous versions of the 
document.

Personnel

   Stephen Farrell is the  Document Shepherd.
   Benjamin Kaduk is the Responsible Area Director.

   The IANA Expert(s) for the registries
   in this document are:
 Yoav Nir , 
 Rich Salz , and 
 Nick Sullivan  .
  The named experts have been approved previously
  on the March 8, 2018 Formal telechat.




RFC Editor Note

Section 15 mentions "values with the first byte in the range" (twice), but 
there is only a single byte,
so these should just be "values in the range".

Please also note that the traditional "IANA shall do/has done" constructions to 
be resolved to the
past tense appear throughout the document, not just in an IANA considerations 
section.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Record Size Limit Extension for Transport Layer Security (TLS)' to Proposed Standard (draft-ietf-tls-record-limit-03.txt)

2018-05-29 Thread The IESG
The IESG has approved the following document:
- 'Record Size Limit Extension for Transport Layer Security (TLS)'
  (draft-ietf-tls-record-limit-03.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-record-limit/





Technical Summary

This draft defines a TLS extension to negotiate the maximum size of protected 
records that each peers sends.
This mechanism replaces the maximum fragment length extension defined in RFC 
6066.
It’s standards track because it updates RFC 6066, which is a Proposed Standard.

Working Group Summary

The draft was very well received by the WG, resulting in minimal, minor 
comments.
Unlike other TLS-related topics, this WG settled on a solution quickly and 
consensus was very easily found.

Document Quality

This document received careful review from several participants, including 
pointing out
some subtle edge cases and differences between TLS 1.2 and TLS 1.3 that got 
resolved in the
document.

Personnel

Sean Turner is the document shepherd.
Benjamin Kaduk is the responsible Area Director.



RFC Editor Note

  Two late-breaking changes, both in Section 1:

OLD
   Implementing Transport Layer Security (TLS) [TLS] or Datagram TLS
   (DTLS) [DTLS] constrained devices can be challenging.  However,

NEW
   Implementing Transport Layer Security (TLS) [TLS] or Datagram TLS
   (DTLS) [DTLS] for constrained devices can be challenging.  However,

OLD
   authenticated data until the entire record is present.  Incremental
   processing of records could expose endpoints to the risk of forged
   data.

NEW
   authenticated data until the entire record is present.  Incremental
   processing of records exposes endpoints to the risk of forged
   data.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Example Handshake Traces for TLS 1.3) to Informational RFC

2018-07-10 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Example Handshake Traces for TLS 1.3'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-07-24. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   Examples of TLS 1.3 handshakes are shown.  Private keys and inputs
   are provided so that these handshakes might be reproduced.
   Intermediate values, including secrets, traffic keys and IVs are
   shown so that implementations might be checked incrementally against
   these values.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-vectors/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-vectors/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Document Action: 'Example Handshake Traces for TLS 1.3' to Informational RFC (draft-ietf-tls-tls13-vectors-07.txt)

2018-11-04 Thread The IESG
The IESG has approved the following document:
- 'Example Handshake Traces for TLS 1.3'
  (draft-ietf-tls-tls13-vectors-07.txt) as Informational RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-vectors/





Technical Summary

This document provides examples TLS 1.3 handshakes.  Private keys and inputs 
are provided
so that these handshakes might be reproduced with are shown.  As the examples 
are illustrative
the draft is intended to be Informational.  Earlier versions of the document 
were widely verified
against multiple implementations, and the latest version has been at least 
partially verified by
two implementations.

Working Group Summary

There's always interest in having examples and this draft fills that gap for 
TLS, which some would
say have been sorely need for a very long time.  While there wasn't a lot of 
list traffic on this draft,
you could argue that there's lots of review because the vectors are 
automatically generated using the
NSS test suite.  NSS is used to do interop with a number of implementations.

Document Quality

There are at least six interoperable implementations of TLS 1.3, though as 
mentioned
above these specific test vectors have only been explicitly confirmed on a 
couple of them.
That said, the vectors are automatically generated, and since the TLS 1.3 
implementations
continue to interoperate, it is expected that the accuracy of the test vectors 
herein are reflected
in that as well.  No specific role reviews were needed for this document

Personnel

Sean Turner is the Document Shepherd.
Benjamin Kaduk is the responsible Area Director.


RFC Editor Note

In Section 4, please insert after the first paragraph:  
   Note:  The PSK binder uses the same construction as Finished
  and so is labeled as finished here.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Exported Authenticators in TLS) to Proposed Standard

2019-07-02 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Exported Authenticators in TLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2019-07-16. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document describes a mechanism in Transport Layer Security (TLS)
   to provide an exportable proof of ownership of a certificate that can
   be transmitted out of band and verified by the peer.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Applying GREASE to TLS Extensibility) to Informational RFC

2019-07-29 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Applying GREASE to TLS Extensibility'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2019-08-12. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document describes GREASE (Generate Random Extensions And
   Sustain Extensibility), a mechanism to prevent extensibility failures
   in the TLS ecosystem.  It reserves a set of TLS protocol values that
   may be advertised to ensure peers correctly handle unknown values.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-grease/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-grease/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Issues and Requirements for SNI Encryption in TLS) to Informational RFC

2019-08-19 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Issues and Requirements for SNI
Encryption in TLS'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2019-09-02. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This draft describes the general problem of encrypting the Server
   Name Identification (SNI) TLS parameter.  The proposed solutions hide
   a Hidden Service behind a fronting service, only disclosing the SNI
   of the fronting service to external observers.  The draft lists known
   attacks against SNI encryption, discusses the current "co-tenancy
   fronting" solution, and presents requirements for future TLS layer
   solutions.

   In practice, it may well be that no solution can meet every
   requirement, and that practical solutions will have to make some
   compromises.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Document Action: 'Applying GREASE to TLS Extensibility' to Informational RFC (draft-ietf-tls-grease-04.txt)

2019-08-26 Thread The IESG
The IESG has approved the following document:
- 'Applying GREASE to TLS Extensibility'
  (draft-ietf-tls-grease-04.txt) as Informational RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-grease/




Technical Summary

The GREASE (Generate Random Extensions And Sustain
Extensibility) mechanism is intended to prevent extensibility
failures in the TLS ecosystem.  This document reserves some
currently unused values for TLS implementations to advertise
at random.  Correctly implemented peers will ignore these
values and interoperate.  Peers that do not tolerate unknown
values will fail to interoperate, revealing the mistake before it
is widespread.

Working Group Summary

The concept is well understood and was reviewed and adopted
by the WG.  But, there's not much to the draft so there was no
controversy (thankfully).

Document Quality

This draft has successfully been implemented in Google Chrome,
and is expected to be adopted by other actors with large deployment
base and interest in sustaining the maintainability of the ecosystem.

Personnel

Sean Turner is the Document Shepherd.  Benjamin Kaduk is the Responsible AD.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Document Action: 'Issues and Requirements for SNI Encryption in TLS' to Informational RFC (draft-ietf-tls-sni-encryption-09.txt)

2019-10-28 Thread The IESG
The IESG has approved the following document:
- 'Issues and Requirements for SNI Encryption in TLS'
  (draft-ietf-tls-sni-encryption-09.txt) as Informational RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/





Technical Summary

   This draft describes the general problem of encryption of the Server
   Name Identification (SNI) parameter.  The proposed solutions hide a
   Hidden Service behind a Fronting Service, only disclosing the SNI of
   the Fronting Service to external observers.  The draft lists known
   attacks against SNI encryption, discusses the current "co-tenancy
   fronting" solution, and presents requirements for future TLS layer
   solutions.

Working Group Summary

Some working group members are not in favor of encrypting the SNI.  However,
the working group has consensus for continued work on the general topic of SNI 
encryption.

Document Quality

This document describes the problem and does not define a protocol. 
The document has been reviewed by the TLS working group.

Personnel

Document Shepherd: Joseph Salowey
Responsible AD: Ben Kaduk

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key) to Experimental RFC

2019-11-18 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS 1.3 Extension for Certificate-based
Authentication with an
   External Pre-Shared Key'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2019-12-02. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies a TLS 1.3 extension that allows a server to
   authenticate with a combination of a certificate and an external pre-
   shared key (PSK).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-cert-with-extern-psk/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-cert-with-extern-psk/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (TLS Certificate Compression) to Proposed Standard

2019-11-25 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS Certificate Compression'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2019-12-09. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   In TLS handshakes, certificate chains often take up the majority of
   the bytes transmitted.

   This document describes how certificate chains can be compressed to
   reduce the amount of data transmitted and avoid some round trips.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-certificate-compression/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-certificate-compression/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc7932: Brotli Compressed Data Format (Informational - IETF stream)
draft-kucherawy-rfc8478bis: Zstandard Compression and the application/zstd 
Media Type (None - IETF stream)
rfc1950: ZLIB Compressed Data Format Specification version 3.3 
(Informational - Legacy stream)



___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Document Action: 'TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key' to Experimental RFC (draft-ietf-tls-tls13-cert-with-extern-psk-07.txt)

2019-12-23 Thread The IESG
The IESG has approved the following document:
- 'TLS 1.3 Extension for Certificate-based Authentication with an
   External Pre-Shared Key'
  (draft-ietf-tls-tls13-cert-with-extern-psk-07.txt) as Experimental RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-cert-with-extern-psk/




Technical Summary

   This document specifies a TLS 1.3 extension that allows a server to
   authenticate with a combination of a certificate and an external pre-
   shared key (PSK).

Working Group Summary

  The document has strong support from a small number of participants in 
 the working group.  Concerns have been raised about the lack of 
 implementation plans, but there was enough support to move this 
 experimental draft forward. 

Document Quality

Implementation plans are unknown, but the core of the proposal
involves using a "joint in the protocol" in a usage that was envisioned
in the original design; the main work is to record the specific semantics
and signaling involved, to ensure interoperability.

Personnel

Joe Salowey is the document shepherd.
Benjamin Kaduk is the responsible AD.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'TLS Certificate Compression' to Proposed Standard (draft-ietf-tls-certificate-compression-09.txt)

2019-12-23 Thread The IESG
The IESG has approved the following document:
- 'TLS Certificate Compression'
  (draft-ietf-tls-certificate-compression-09.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-certificate-compression/




Technical Summary

This draft defines a TLS extension to compress certificate chains to reduce the 
amount of data transmitted and avoid some round trips.  The compression 
algorithms defined, zlib, brotli, and zstd, are all documented in RFCs.

Working Group Summary

The WG process was unremarkable; the document has been around and stable
for a couple years, and the idea around before that.

Document Quality

Google, Cloudflare, Apple, and FaceBook have implemented this extension.  
Firefox has also indicated they intend to prototype it.  It should also be 
noted that others. eg., the EMU WG, are interested in this feature.

Personnel

Sean Turner is the document shepherd.
Ben Kaduk is the responsible Area Director.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] WG Review: Transport Layer Security (tls)

2020-03-06 Thread The IESG
The Transport Layer Security (tls) WG in the Security Area of the IETF is
undergoing rechartering. The IESG has not made any determination yet. The
following draft charter was submitted, and is provided for informational
purposes only. Please send your comments to the IESG mailing list
(i...@ietf.org) by 2020-03-16.

Transport Layer Security (tls)
---
Current status: Active WG

Chairs:
  Christopher Wood 
  Joseph Salowey 
  Sean Turner 

Assigned Area Director:
  Benjamin Kaduk 

Security Area Directors:
  Benjamin Kaduk 
  Roman Danyliw 

Mailing list:
  Address: tls@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/tls
  Archive: https://mailarchive.ietf.org/arch/browse/tls/

Group page: https://datatracker.ietf.org/group/tls/

Charter: https://datatracker.ietf.org/doc/charter-ietf-tls/

The TLS (Transport Layer Security) working group was established in 1996 to
standardize a 'transport layer' security protocol. The basis for the work was
SSL (Secure Socket Layer) v3.0 [RFC6101]. The TLS working group has completed
a series of specifications that describe the TLS protocol v1.0 [RFC2246],
v1.1 [RFC4346], v1.2 [RFC5346], and v1.3 [RFC8446], and DTLS (Datagram TLS)
v1.0 [RFC4347], v1.2 [RFC6347], and v1.3 [draft-ietf-tls-dtls13], as well as
extensions to the protocols and ciphersuites.

The working group aims to achieve three goals. First, improve the
applicability and suitability of the TLS family of protocols for use in
emerging protocols and use cases. This includes extensions or changes that
help protocols better use TLS as an authenticated key exchange protocol, or
extensions that help protocols better leverage TLS security properties, such
as Exported Authenticators. Extensions that focus specifically on protocol
extensibility are also in scope. This goal also includes protocol changes
that reduce TLS resource consumption without affecting security. Extensions
that help reduce TLS handshake size meet this criterion.

The second working group goal is to improve security, privacy, and
deployability. This includes, for example, Delegated Credentials, Encrypted
SNI, and GREASE (RFC 8701). Security and privacy goals will place emphasis on
the following:

- Encrypt the ClientHello SNI (Server Name Indication) and other
application-sensitive extensions, such as ALPN (Application-Layer Protocol
Negotiation).

- Identify and mitigate other (long-term) user tracking or fingerprinting
vectors enabled by TLS deployments and implementations.

The third goal is to maintain current and previous version of the (D)TLS
protocol as well as to specify general best practices for use of (D)TLS,
extensions to (D)TLS, and cipher suites. This includes recommendations as to
when a particular version should be deprecated. Changes or additions to older
versions of (D)TLS whether via extensions or ciphersuites are discouraged and
require significant justification to be taken on as work items.

The working group will also place a priority in minimizing gratuitous changes
to (D)TLS.

Milestones:

TBD

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] WG Action: Rechartered Transport Layer Security (tls)

2020-04-22 Thread The IESG
The Transport Layer Security (tls) WG in the Security Area of the IETF has
been rechartered. For additional information, please contact the Area
Directors or the WG Chairs.

Transport Layer Security (tls)
---
Current status: Active WG

Chairs:
  Christopher Wood 
  Joseph Salowey 
  Sean Turner 

Assigned Area Director:
  Benjamin Kaduk 

Security Area Directors:
  Benjamin Kaduk 
  Roman Danyliw 

Mailing list:
  Address: tls@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/tls
  Archive: https://mailarchive.ietf.org/arch/browse/tls/

Group page: https://datatracker.ietf.org/group/tls/

Charter: https://datatracker.ietf.org/doc/charter-ietf-tls/

The TLS (Transport Layer Security) working group was established in 1996 to
standardize a 'transport layer' security protocol. The basis for the work was
SSL (Secure Socket Layer) v3.0 [RFC6101]. The TLS working group has completed
a series of specifications that describe the TLS protocol v1.0 [RFC2246],
v1.1 [RFC4346], v1.2 [RFC5346], and v1.3 [RFC8446], and DTLS (Datagram TLS)
v1.0 [RFC4347], v1.2 [RFC6347], and v1.3 [draft-ietf-tls-dtls13], as well as
extensions to the protocols and ciphersuites.

The working group aims to achieve three goals. First, improve the
applicability and suitability of the TLS family of protocols for use in
emerging protocols and use cases. This includes extensions or changes that
help protocols better use TLS as an authenticated key exchange protocol, or
extensions that help protocols better leverage TLS security properties, such
as Exported Authenticators. Extensions that focus specifically on protocol
extensibility are also in scope. This goal also includes protocol changes
that reduce TLS resource consumption without affecting security. Extensions
that help reduce TLS handshake size meet this criterion.

The second working group goal is to improve security, privacy, and
deployability. This includes, for example, Delegated Credentials and
Encrypted SNI. Security and privacy goals will place emphasis on the
following:

- Encrypt the ClientHello SNI (Server Name Indication) and other
application-sensitive extensions, such as ALPN (Application-Layer Protocol
Negotiation).

- Identify and mitigate other (long-term) user tracking or fingerprinting
vectors enabled by TLS deployments and implementations.

The third goal is to maintain current and previous version of the (D)TLS
protocol as well as to specify general best practices for use of (D)TLS,
extensions to (D)TLS, and cipher suites. This includes recommendations as to
when a particular version should be deprecated. Changes or additions to older
versions of (D)TLS whether via extensions or ciphersuites are discouraged and
require significant justification to be taken on as work items.

The working group will also place a priority in minimizing gratuitous changes
to (D)TLS.

Milestones:

  Jul 2020 - Submit "Deprecating MD5 and SHA-1 signature hashes in TLS 1.2"
  to the IESG

  Sep 2020 - Submit "Delegated Credentials for TLS" to the IESG

  Nov 2020 - Submit "TLS Ticket Requests" to the IESG

  Nov 2020 - Submit "A Flags Extension for TLS 1.3" to the IESG

  Jan 2021 - Submit "Importing External PSKs for TLS" to the IESG

  Mar 2021 - Submit "Encrypted Server Name Indication for TLS 1.3" to the IESG

  Mar 2021 - Submit "Batch Signing for TLS" to the IESG

  Jul 2021 - Submit "Semi-Static Diffie-Hellman Key Establishment for TLS
  1.3" to the IESG

  Jul 2021 - Submit "Compact TLS 1.3" to the IESG

  Nov 2021 - Submit "Hybrid key exchange in TLS 1.3" to the IESG



___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)) to Proposed Standard

2016-03-22 Thread The IESG

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2016-04-05. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes the use of the ChaCha stream cipher and
   Poly1305 authenticator in the Transport Layer Security (TLS) and
   Datagram Transport Layer Security (DTLS) protocols.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-chacha20-poly1305/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-chacha20-poly1305/ballot/


No IPR declarations have been submitted directly on this I-D.

I-D nits notes that the abstract doesn't mention the two RFCs being updated.
That is a useful practice (in case someone only sees the abstract) so we'll fix
it after IETF LC.

This draft normatively references RFCs 4492, 5489 and 7539 which 
are algorithm definitions. If needed we will put those in the DownRef
registry after this last call concludes. 

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Transport Layer Security (TLS) False Start) to Experimental RFC

2016-04-06 Thread The IESG

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'Transport Layer Security (TLS) False Start'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2016-04-20. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document specifies an optional behavior of TLS client
   implementations, dubbed False Start.  It affects only protocol
   timing, not on-the-wire protocol data, and can be implemented
   unilaterally.  A TLS False Start reduces handshake latency to one
   round trip.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-falsestart/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-falsestart/ballot/


No IPR declarations have been submitted directly on this I-D.

The reference to RFC2616 should probably be updated to 7230.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)' to Proposed Standard (draft-ietf-tls-chacha20-poly1305-04.txt)

2016-05-09 Thread The IESG
The IESG has approved the following document:
- 'ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)'
  (draft-ietf-tls-chacha20-poly1305-04.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working
Group.

The IESG contact persons are Stephen Farrell and Kathleen Moriarty.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-chacha20-poly1305/





1. Summary

This draft specifies seven (7) chacha20-poly1305 ciphers 
that can be used with TLS and DTLS.  This is the “how to 
do chacha20-poly1305 with TLS” draft, where 
chacha20-poly1305 is defined in RFC 7539. These cipher 
suites are intended to be a back up to the AES-based suites 
in case of compromise.

As far as where you should point your fingers:
- Sean Turner is the document shepherd, and;
- Stephen Farrell is the responsible Area Director.

2. Review and Consensus

There’s probably on the order of 100 messages about this 
draft, and that shouldn’t come as a surprise because this 
draft is really just specifying IANA code points.  The real 
fireworks were on the CFRG list, and we thank them for 
taking that bullet(s).  The cipher suites proposed in the 
individual draft were modified based on WG input.  There 
were two WGLCs for this draft; the first didn’t generate the 
expected amount of review so a second WGLC was issued 
that did.  There was a debate as to whether the PRF digest 
should be changed to SHA-512 from SHA-256, but there 
was no consensus to make this change.

3. Intellectual Property

All disclosed as confirmed by the authors on 20160310.

4. Other Points:

IANA has already assigned the cipher suites and we thank them.

These algorithms are expected to be very widely implemented 
due their high performance in software implementations.  
It’s currently in the deployed branches of BoringSSL GnuTLS, 
OpenSSL, and others.




RFC Editor Note

  1) Please add the following to the end of the abstract: "This
  document updates RFCs 5246 and 6347."

2) Please add a normative reference for SHA256 at the end
of section 3, thusly...

OLD:

   The pseudorandom function (PRF) for all the cipher suites defined in
   this document is the TLS PRF with SHA-256 as the hash function.

NEW:

   The pseudorandom function (PRF) for all the cipher suites defined in
   this document is the TLS PRF with SHA-256 [FIPS 180-4] as the hash function.

The reference to add to section 6.1 is:

[FIPS 180-4]  Federal Information Processing Standards Publication
(FIPS PUB) 180-4, Secure Hash Standard (SHS), August 2015.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Transport Layer Security (TLS) Cached Information Extension' to Proposed Standard (draft-ietf-tls-cached-info-23.txt)

2016-05-17 Thread The IESG
The IESG has approved the following document:
- 'Transport Layer Security (TLS) Cached Information Extension'
  (draft-ietf-tls-cached-info-23.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working
Group.

The IESG contact persons are Stephen Farrell and Kathleen Moriarty.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-cached-info/





Technical Summary

   This document defines an extension that allows a TLS client to inform
   a server of cached information, allowing the server to omit already
   available information.


Working Group Summary

   This document has gone through a long working group process and 
   many revisions.  We believe the document has had sufficient review 
   and is ready for publication.  The TLS working group consensus around 
   the document is not strong, as the main body of interest for this work 
   is in the DICE group.  

Document Quality

This document has had extensive review over a long period of time 
in the TLS working group.  The document is a dependency of the DICE 
working group.

Personnel

   Joseph Salowey is the document shepherd.  The responsible AD is Stephen 
Farrell. 

IANA Note

 In section 8.2, please mark the value zero (0) as reserved. (As 
 suggested by Barry Leiba in his IESG review.)

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Document Action: 'Transport Layer Security (TLS) False Start' to Informational RFC (draft-ietf-tls-falsestart-02.txt)

2016-05-23 Thread The IESG
The IESG has approved the following document:
- 'Transport Layer Security (TLS) False Start'
  (draft-ietf-tls-falsestart-02.txt) as Informational RFC

This document is the product of the Transport Layer Security Working
Group.

The IESG contact persons are Stephen Farrell and Kathleen Moriarty.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-falsestart/




1. Summary

"False Start” was an attempt to reduce the latency impact of HTTPS based on 
the simple premise that the client send application data earlier in the 
handshake; to be precise clients send application data before they have 
received and verified the server's "Finished” message.  Initial measurements 
showed a 30% reduction in latency [0] I could paraphrase more of s2, but the 
authors explained the timing and the implications at the end of s2.

Note that this “experiment” was supported by Chrome, FF, IE, OpenSSL, NSS, 
and others. Some additional details:

- Chrome 20 disable it except for sites that enabled NPN.

- Firefox has (or at some point had) an NPN requirement to enable False Start.

- Safari as an additional example without the NPN requirement:
http://opensource.apple.com/source/Security/Security-55471/libsecurity_ssl/lib/sslTransport.c

- While there were patches to enable False Start with OpenSSL, it's not clear 
it was ever part of an official release.  

As far as where you should point your fingers:
- Sean Turner is the document shepherd, and;
- Stephen Farrell is the responsible Area Director.

2. Review and Consensus

There wasn’t a whole lot of discussion, primarily because "False Start” the 
implementation issues were worked out by the browsers and the WG didn’t adopt 
this draft until long after (Nov-2014).  The draft was adopted because it 
documents existing practices and provides security considerations [0]; the 
comments in the WG adoption thread were incorporated in the -01 WG version.  
The WG’s deliberations resulted in a number of changes that more accurately 
reflect deployments (i.e., dropping server-side False Start) as well as 
restricting its use to pre-TLS1.3 (see s5.2) and cipher suites (see s5.3).

One reviewer wanted all (FF-)DHE cipher suites removed because they believe 
that the downgrade protections defined in [1] are in adequate. To solve address 
this issue, the “False Start” draft requires whitelists as well as large 
groups/curves.

[0] https://mailarchive.ietf.org/arch/msg/tls/RLklpxmZ3BQRBIqWgfeUcCLhgx0
[1] https://datatracker.ietf.org/doc/draft-ietf-tls-negotiated-ff-dhe/





RFC Editor Note

 Please change the intended status in the header to "Informational"
 I don't believe any other text changes are needed. (The IESG and
 authors figured that informational was better during IESG eval.)

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier) to Proposed Standard

2017-02-17 Thread The IESG

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer
   Security (TLS) Versions 1.2 and Earlier'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-03-03. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes key exchange algorithms based on Elliptic
   Curve Cryptography (ECC) for the Transport Layer Security (TLS)
   protocol.  In particular, it specifies the use of Ephemeral Elliptic
   Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the
   use of Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards
   Digital Signature Algorithm (EdDSA) as authentication mechanisms.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc4492bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc4492bis/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc8032: Edwards-Curve Digital Signature Algorithm (EdDSA) (Informational - 
IRTF Stream)
rfc7748: Elliptic Curves for Security (Informational - IRTF Stream)
These are already be listed in the acceptable Downref Registry.


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for Transport Layer Security (TLS)) to Proposed Standard

2017-05-04 Thread The IESG

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for Transport Layer
   Security (TLS)'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-05-18. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document defines several new cipher suites for the Transport
   Layer Security (TLS) protocol.  The cipher suites are all based on
   the Ephemeral Elliptic Curve Diffie-Hellman with Pre-Shared Key
   (ECDHE_PSK) key exchange together with the Authenticated Encryption
   with Associated Data (AEAD) algorithms AES-GCM and AES-CCM.  PSK
   provides light and efficient authentication, ECDHE provides perfect
   forward secrecy, and AES-GCM and AES-CCM provides encryption and
   integrity protection.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-psk-aead/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-psk-aead/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier' to Proposed Standard (draft-ietf-tls-rfc4492bis-17.txt)

2017-05-12 Thread The IESG
The IESG has approved the following document:
- 'Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer
   Security (TLS) Versions 1.2 and Earlier'
  (draft-ietf-tls-rfc4492bis-17.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working
Group.

The IESG contact persons are Kathleen Moriarty and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc4492bis/





Technical Summary

 This document adds Elliptic Curve Cryptography (ECC) cipher suites to
 TLS 1.0-1.2.  These cipher suites have some technical
 advantages over the currently defined RSA and DH/DSS cipher suites in
 terms of key size and performance.  This document does not entail any
 changes to the TLS base specification.

 Note that Appendix B lists the changes from RFC 4492.

Working Group Summary

 The WG was able to achieve consensus on advancing this
 document to Proposed Standard.  Moving RFC 4492 to Standards
 Track was the main reason for the draft.  It seemed odd to specify
 MTI algorithms based on ECC in TLS1.3 and have the TLS1.0-1.2
 RFC for the same algorithms be Informational.

Note that we needed to consult the CFRG on the "use of contexts".
Our thanks to them for contributing to this work.

Document Quality

 This is a bis draft so the majority of the draft has been reviewed by
 the IETF already.  The -00 version of the individual draft allows easy
 diff to what was published as RFC 4492.  Note that more was taken
 out than put in.

Personnel

 Sean Turner is the Document Shepherd.
 Kathleen Moriarty is the responsible AD.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for Transport Layer Security (TLS) Protocol version 1.2) to Proposed Standard

2017-07-17 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'ECDHE_PSK with AES-GCM and AES-CCM Cipher
Suites for Transport Layer
   Security (TLS) Protocol version 1.2'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-07-31. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document defines several new cipher suites for the Transport
   Layer Security (TLS) protocol version 1.2.  The cipher suites are all
   based on the Ephemeral Elliptic Curve Diffie-Hellman with Pre-Shared
   Key (ECDHE_PSK) key exchange together with the Authenticated
   Encryption with Associated Data (AEAD) algorithms AES-GCM and AES-
   CCM.  PSK provides light and efficient authentication, ECDHE provides
   forward secrecy, and AES-GCM and AES-CCM provides encryption and
   integrity protection.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-psk-aead/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-psk-aead/ballot/


No IPR declarations have been submitted directly on this I-D.




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Protocol Action: 'ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for Transport Layer Security (TLS) Protocol version 1.2' to Proposed Standard (draft-ietf-tls-ecdhe-psk-aead-05.txt)

2017-08-11 Thread The IESG
The IESG has approved the following document:
- 'ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for Transport Layer
   Security (TLS) Protocol version 1.2'
  (draft-ietf-tls-ecdhe-psk-aead-05.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Kathleen Moriarty and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-psk-aead/





Technical Summary

   This document defines several new cipher suites for the Transport
   Layer Security (TLS) protocol.  The cipher suites are all based on
   the Ephemeral Elliptic Curve Diffie-Hellman with Pre-Shared Key
   (ECDHE_PSK) key exchange together with the Authenticated Encryption
   with Associated Data (AEAD) algorithms AES-GCM and AES-CCM.  PSK
   provides light and efficient authentication, ECDHE provides perfect
   forward secrecy, and AES-GCM and AES-CCM provides encryption and
   integrity protection.

Working Group Summary

  There is general support for this document in the working group.  
  The main issues focused around trimming down the list of cipher
  suites to the minimum number required.  


Document Quality

  The document has been review by the TLS working group. The SecDir
  review triggered additional useful conversation and draft updates.

Personnel

  Joseph Salowey is the Document Shepherd.
  Kathleen Moriarty is the responsible AD.

IANA Note

  Code points are requested for existing registries. 

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Last Call: (The SSLKEYLOGFILE Format for TLS) to Informational RFC

2024-04-04 Thread The IESG


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The SSLKEYLOGFILE Format for TLS'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2024-04-18. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS]Document Action: 'The SSLKEYLOGFILE Format for TLS' to Informational RFC (draft-ietf-tls-keylogfile-02.txt)

2024-07-25 Thread The IESG
The IESG has approved the following document:
- 'The SSLKEYLOGFILE Format for TLS'
  (draft-ietf-tls-keylogfile-02.txt) as Informational RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/




Technical Summary

   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.

Working Group Summary


   The one thing that worried some people (including your responsible AD)
   was the fact that this could be used as pervasive monitoring tool if this
   file is offloaded/shared on production systems. Numerous warnings were
   added to the document to not do this. As the feature is already readily
   available (Firefox, Chrome, Wireshark, openssl, libcurl, etc.) those
   who are building such monitoring devices can already do so anyway.

Document Quality

  This is documenting a widely deployed feature that is used for development
  and debugging major crypto libraries and browsers (see above)

Personnel

   The Document Shepherd for this document is Sean Turner. The Responsible
   Area Director is Paul Wouters.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (The Transport Layer Security (TLS) Protocol Version 1.3) to Proposed Standard

2024-10-18 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The Transport Layer Security (TLS)
Protocol Version 1.3'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2024-11-01. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8446bis/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc8439: ChaCha20 and Poly1305 for IETF Protocols (Informational - Internet 
Research Task Force (IRTF) stream)
rfc6962: Certificate Transparency (Experimental - Internet Engineering Task 
Force (IETF) stream)




___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings) to Proposed Standard

2024-10-22 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Bootstrapping TLS Encrypted ClientHello
with DNS Service Bindings'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2024-11-15. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   To use TLS Encrypted ClientHello (ECH) the client needs to learn the
   ECH configuration for a server before it attempts a connection to the
   server.  This specification provides a mechanism for conveying the
   ECH configuration information via DNS, using a SVCB or HTTPS record.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (TLS 1.2 is in Feature Freeze) to Informational RFC

2024-12-23 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS 1.2 is in Feature Freeze'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-01-13. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   Use of TLS 1.3 is growing and fixes some known deficiencies in TLS
   1.2.  This document specifies that outside of urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.  This prescription does not pertain to DTLS (in any DTLS
   version); it pertains to TLS only.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (TLS 1.2 is in Feature Freeze) to Proposed Standard

2025-02-11 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS 1.2 is in Feature Freeze'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-02-25. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   Use of TLS 1.3 is growing and fixes some known deficiencies in TLS
   1.2.  This document specifies that outside of urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.  This prescription does not pertain to DTLS (in any DTLS
   version); it pertains to TLS only.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
draft-ietf-tls-rfc8447bis: IANA Registry Updates for TLS and DTLS (None - 
Internet Engineering Task Force (IETF) stream)




___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (The SSLKEYLOGFILE Format for TLS) to Informational RFC

2025-04-09 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The SSLKEYLOGFILE Format for TLS'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-04-23. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (Deprecating Obsolete Key Exchange Methods in TLS 1.2) to Proposed Standard

2025-04-14 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Deprecating Obsolete Key Exchange Methods
in TLS 1.2'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-04-28. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-deprecate-obsolete-kex/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc6209: Addition of the ARIA Cipher Suites to Transport Layer Security 
(TLS) (Informational - Internet Engineering Task Force (IETF) stream)
rfc6367: Addition of the Camellia Cipher Suites to Transport Layer Security 
(TLS) (Informational - Internet Engineering Task Force (IETF) stream)




___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Extended Last Call: (The SSLKEYLOGFILE Format for TLS) to Informational RFC

2025-04-15 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The SSLKEYLOGFILE Format for TLS'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-05-07. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (IANA Registry Updates for TLS and DTLS) to Proposed Standard

2025-03-12 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'IANA Registry Updates for TLS and DTLS'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-04-09. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings) to Proposed Standard

2025-02-20 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Bootstrapping TLS Encrypted ClientHello
with DNS Service Bindings'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-03-13. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   To use TLS Encrypted ClientHello (ECH) the client needs to learn the
   ECH configuration for a server before it attempts a connection to the
   server.  This specification provides a mechanism for conveying the
   ECH configuration information via DNS, using a SVCB or HTTPS record.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (TLS Encrypted Client Hello) to Proposed Standard

2025-02-20 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS Encrypted Client Hello'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-03-13. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.


The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-esni/



No IPR declarations have been submitted directly on this I-D.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (Return Routability Check for DTLS 1.2 and DTLS 1.3) to Proposed Standard

2025-05-27 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Return Routability Check for DTLS 1.2 and
DTLS 1.3'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-06-10. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies a return routability check for use in context
   of the Connection ID (CID) construct for the Datagram Transport Layer
   Security (DTLS) protocol versions 1.2 and 1.3.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Transport Layer
   Security Working Group mailing list (tls@ietf.org), which is archived
   at https://mailarchive.ietf.org/arch/browse/tls/.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/dtls-rrc.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-dtls-rrc/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Protocol Action: 'TLS 1.2 is in Feature Freeze' to Proposed Standard (draft-ietf-tls-tls12-frozen-08.txt)

2025-06-18 Thread The IESG
The IESG has approved the following document:
- 'TLS 1.2 is in Feature Freeze'
  (draft-ietf-tls-tls12-frozen-08.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/




Technical Summary

   Use of TLS 1.3 is growing and fixes some known deficiencies in TLS
   1.2.  This document specifies that outside of urgent security fixes,
   new TLS Exporter Labels, or new Application-Layer Protocol
   Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS
   1.2.  This prescription does not pertain to DTLS (in any DTLS
   version); it pertains to TLS only.

Working Group Summary

   No issues and broad consensus
   Informational Track was originally requested, but after discussions with
   IANA and the AD it was changed to Standards Track because the I-D updates
   registration procedures for a number of registries.

  
Document Quality

  This does not define a protocol. Text is clear on IANA updates.

Personnel

   The Document Shepherd for this document is Sean Turner. The Responsible
   Area Director is Paul Wouters.

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Protocol Action: 'IANA Registry Updates for TLS and DTLS' to Proposed Standard (draft-ietf-tls-rfc8447bis-14.txt)

2025-06-16 Thread The IESG
The IESG has approved the following document:
- 'IANA Registry Updates for TLS and DTLS'
  (draft-ietf-tls-rfc8447bis-14.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/




Technical Summary

   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

Working Group Summary

  The document represents consensus of the WG.

  The I-D was originally was an “obsoletes” I-D, i.e., it was to completely
  replace RFC 8447, but the WG wanted “bis” I-D instead, i.e., it includes just
  what needs to change. The WG felt it was easier to explain what needs to 
change
  as opposed to what was changed and needs to be changed. If the IESG is adamant
  that this I-D be an “obsoletes” I-D, then there will be some controversy.

 
Document Quality

   N/A for an IANA only document
Personnel

   The Document Shepherd for this document is Deirdre Connolly. The
   Responsible Area Director is Paul Wouters.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Protocol Action: 'Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings' to Proposed Standard (draft-ietf-tls-svcb-ech-08.txt)

2025-06-16 Thread The IESG
The IESG has approved the following document:
- 'Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings'
  (draft-ietf-tls-svcb-ech-08.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/




Technical Summary

   To use TLS Encrypted ClientHello (ECH) the client needs to learn the
   ECH configuration for a server before it attempts a connection to the
   server.  This specification provides a mechanism for conveying the
   ECH configuration information via DNS, using a SVCB or HTTPS record.

Working Group Summary

Please note that the text in this I-D was initially developed in the DNSOP WG,
went through IETF LC, and IESG review. The result of the IESG review was to take
the text in this I-D out of RFC 9460 (was draft-ietf-dnsop-svcb-http) and run 
the
new I-D through the TLS WG. The text in this I-D is essentially the same text
taken from -11 of draft-ietf-dnsop-svcb-http. In some respects, you could claim
that this I-D has consensus from multiple WGs.
See also: https://mailarchive.ietf.org/arch/msg/tls/Vct8iUc4IgSHENX2r9IGOQFLkyk/

Document Quality

This specification is implemented today by Chrome, Firefox, and Safari [1],
and is deployed on all Cloudflare free tier domains [2].

[1] https://chromestatus.com/feature/6196703843581952
[2] https://blog.cloudflare.com/announcing-encrypted-client-hello

Personnel

   The Document Shepherd for this document is Sean Turner. The Responsible
   Area Director is Paul Wouters.

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (Hybrid key exchange in TLS 1.3) to Informational RFC

2025-06-17 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'Hybrid key exchange in TLS 1.3'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-07-01. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/



No IPR declarations have been submitted directly on this I-D.

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Document Action: 'The SSLKEYLOGFILE Format for TLS' to Informational RFC (draft-ietf-tls-keylogfile-05.txt)

2025-06-11 Thread The IESG
The IESG has approved the following document:
- 'The SSLKEYLOGFILE Format for TLS'
  (draft-ietf-tls-keylogfile-05.txt) as Informational RFC

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/




Technical Summary

   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.

Working Group Summary

   The one thing that worried some people (including your responsible AD)
   was the fact that this could be used as pervasive monitoring tool if this
   file is offloaded/shared on production systems. Numerous warnings were
   added to the document to not do this. As the feature is already readily
   available (Firefox, Chrome, Wireshark, openssl, libcurl, etc.) those
   who are building such monitoring devices can already do so anyway.

   An additional WGLC was done to confirm the feeling of the room at IETF 122,
   and no new voices objecting were heard. The IETF LC was extended by another
   two weeks to give people more time to raise their concens, but again no
   new people raised objections.

Document Quality

  This is documenting a widely deployed feature that is used for development
  and debugging major crypto libraries and browsers (see above)

Personnel

   The Document Shepherd for this document is Sean Turner. The Responsible
   Area Director is Paul Wouters.


___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Last Call: (TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key) to Proposed Standard

2025-07-07 Thread The IESG

The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'TLS 1.3 Extension for Using Certificates
with an External Pre-Shared
   Key'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2025-07-28. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-8773bis/



No IPR declarations have been submitted directly on this I-D.





___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Protocol Action: 'TLS Encrypted Client Hello' to Proposed Standard (draft-ietf-tls-esni-25.txt)

2025-07-09 Thread The IESG
The IESG has approved the following document:
- 'TLS Encrypted Client Hello'
  (draft-ietf-tls-esni-25.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-esni/




Technical Summary

   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Working Group Summary

  The document has broad consensus. While there are some concerns about the
  ease with with this can (and is) being filtered, extension work to prevent
  this in the future has started and will not require changes to this document.

Document Quality

   Draft versions of this protocol have been deployed and tested at scale. A
   number of vendors have implemented this protocol and tested 
interoperability. 
   Some of the implementers include: Server Side - Google, Cloudflare Client 
Side,
   Firefox, Chrome

   There is code available several libraries including OpenSSL, BoringSSL and 
rustls

Personnel

   The Document Shepherd for this document is Joseph A. Salowey. The
   Responsible Area Director is Paul Wouters.

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org


[TLS] Protocol Action: 'TLS Encrypted Client Hello' to Proposed Standard (draft-ietf-tls-esni-25.txt)

2025-07-09 Thread The IESG
The IESG has approved the following document:
- 'TLS Encrypted Client Hello'
  (draft-ietf-tls-esni-25.txt) as Proposed Standard

This document is the product of the Transport Layer Security Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-esni/




Technical Summary

   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Working Group Summary

  The document has broad consensus. While there are some concerns about the
  ease with with this can (and is) being filtered, extension work to prevent
  this in the future has started and will not require changes to this document.

Document Quality

   Draft versions of this protocol have been deployed and tested at scale. A
   number of vendors have implemented this protocol and tested 
interoperability. 
   Some of the implementers include: Server Side - Google, Cloudflare Client 
Side,
   Firefox, Chrome

   There is code available several libraries including OpenSSL, BoringSSL and 
rustls

Personnel

   The Document Shepherd for this document is Joseph A. Salowey. The
   Responsible Area Director is Paul Wouters.

___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org