Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Martin Thomson
On 21 February 2016 at 21:46, Ilari Liusvaara wrote: >> We originally thought that we might want to do this for >> WebRTC/real-time. As it so happens, we have an alternative design >> that doesn't need this, so... > > Got mailarchive or draft link? No, this was a realization that we could just s

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Ilari Liusvaara
On Sun, Feb 21, 2016 at 11:31:04AM -0800, Martin Thomson wrote: > I'm sitting here in TRON listening to Karthik describe all the various > ways in which client authentication in 0-RTT is bad. I'm particularly > sympathetic to the perpetual impersonation attack that arises when the > client's ephem

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Russ Housley
+1 On Sun, Feb 21, 2016 at 11:31 AM, Martin Thomson wrote: I'm sitting here in TRON listening to Karthik describe all the various ways in which client authentication in 0-RTT is bad. I'm particularly sympathetic to the perpetual impersonation attack that arises when the client's ephemeral key

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Andrei Popov
I am strongly in favor of removing client auth from 0-RTT. Cheers, Andrei From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Eric Rescorla Sent: Sunday, February 21, 2016 11:37 AM To: Martin Thomson Cc: tls@ietf.org Subject: Re: [TLS] Remove 0-RTT client auth +1 On Sun, Feb 21, 2016 at 11:3

[TLS] New IETF 95 Hackathon technology: TLS 1.3

2016-02-21 Thread Nick Sullivan
At the TRON workshop at NDSS there was interest in a hackathon project to work on TLS 1.3 implementations and to test interoperability. I have added this as a topic for the IETF 95 Hackathon. If you are interested in participating, please sign up here: https://www.ietf.org/registration/MeetingWiki

Re: [TLS] WG last call of draft-ietf-avtcore-rfc5764-mux-fixes-05

2016-02-21 Thread Marc Petit-Huguenin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 02/07/2016 11:17 PM, Dave Garrett wrote: > Permanently gobbling up the majority of the codespace feels like > excessive force here. This is not what the RFC-to-be is proposing. We are just marking the values that can create an issue when used

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Martin Thomson
On 21 February 2016 at 12:06, Eric Rescorla wrote: > I think we're going to have to invent a 0-RTT exporter (yes, I understand > that this > requires care). We might disagree about that "have to". I'd be happier if the 0-RTT data couldn't rely on the existence of an exporter. If that means that

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Eric Rescorla
On Sun, Feb 21, 2016 at 12:05 PM, Martin Thomson wrote: > On 21 February 2016 at 12:01, Adam Langley wrote: > > The token-binding(*) folks care about authenticating 0-RTT requests, > > although they are currently working at the application-layer[1] and so > > would be recreating 0-RTT client aut

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Martin Thomson
On 21 February 2016 at 12:01, Adam Langley wrote: > The token-binding(*) folks care about authenticating 0-RTT requests, > although they are currently working at the application-layer[1] and so > would be recreating 0-RTT client authentication on top of TLS. (They > would thus have all the same is

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Adam Langley
On Sun, Feb 21, 2016 at 11:31 AM, Martin Thomson wrote: > I'm sitting here in TRON listening to Karthik describe all the various > ways in which client authentication in 0-RTT is bad. I'm particularly > sympathetic to the perpetual impersonation attack that arises when the > client's ephemeral ke

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Eric Rescorla
Correct. -Ekr On Sun, Feb 21, 2016 at 11:41 AM, Cedric Fournet wrote: > Agreed. For what it is worth, 0-RTT with PSK would still provide implicit > client authentication. > > > > > > *From:* TLS [mailto:tls-boun...@ietf.org] *On Behalf Of *Eric Rescorla > *Sent:* 21 February 2016 19:37 > *To:*

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Martin Thomson
On 21 February 2016 at 11:41, Cedric Fournet wrote: > Agreed. For what it is worth, 0-RTT with PSK would still provide implicit > client authentication. s/would/could That implies many of the hazards that we were talking about here, so none of this makes 0-RTT any less of a hazard. ___

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Cedric Fournet
Agreed. For what it is worth, 0-RTT with PSK would still provide implicit client authentication. From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Eric Rescorla Sent: 21 February 2016 19:37 To: Martin Thomson Cc: tls@ietf.org Subject: Re: [TLS] Remove 0-RTT client auth +1 On Sun, Feb 21,

Re: [TLS] Unified Client Authentication

2016-02-21 Thread Martin Thomson
On 21 February 2016 at 11:33, Watson Ladd wrote: > Currently we client authenticate after handshake and during handshake. > Why not unify these by making all client authentication take place > after the handshake? This will simplify the state machine. I believe that we discussed this extensively

Re: [TLS] Unified Client Authentication

2016-02-21 Thread Eric Rescorla
This was discussed at the TLS interim and the argument against was that there was limited demand for the post-handshake mode and that people wanted to have a mode they were very comfortable with as the "main" thing. Of course, it may be time to revisit that decision. -Ekr On Sun, Feb 21, 2016 at

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Eric Rescorla
+1 On Sun, Feb 21, 2016 at 11:31 AM, Martin Thomson wrote: > I'm sitting here in TRON listening to Karthik describe all the various > ways in which client authentication in 0-RTT is bad. I'm particularly > sympathetic to the perpetual impersonation attack that arises when the > client's ephemer

[TLS] Unified Client Authentication

2016-02-21 Thread Watson Ladd
Currently we client authenticate after handshake and during handshake. Why not unify these by making all client authentication take place after the handshake? This will simplify the state machine. https://github.com/tlswg/tls13-spec/issues/421 talks about this in the last sentence. __

[TLS] Remove 0-RTT client auth

2016-02-21 Thread Martin Thomson
I'm sitting here in TRON listening to Karthik describe all the various ways in which client authentication in 0-RTT is bad. I'm particularly sympathetic to the perpetual impersonation attack that arises when the client's ephemeral key is compromised. We originally thought that we might want to do

Re: [TLS] Do we actually need semi-static DHE-based 0-RTT?

2016-02-21 Thread Nick Sullivan
On Fri, Feb 19, 2016 at 3:15 PM, Dave Garrett wrote: > On Friday, February 19, 2016 05:24:25 pm Eric Rescorla wrote: > > My impression is exactly the opposite. All the infrastructure to > PSK-resumption and > > hence PSK-0RTT is already in place for TLS 1.2. And of course > PSK-resumption > > is