Re: [TLS] Technical comment on design draft-rhrd-tls-tls13-visibility-00: why also break integrity/authentication?

2017-11-05 Thread Karthikeyan Bhargavan
Visibility goes both ways. The discussion so far has been primarily about making end-to-end data visible to middleboxes. It would less concerning to do it the other way round, where middleboxes are made visible to the endpoints, and proxying/visbility decisions are made at the endpoints. Indeed,

Re: [TLS] Technical comment on design draft-rhrd-tls-tls13-visibility-00: why also break integrity/authentication?

2017-11-05 Thread Joseph Salowey
I'm in agreement with Stephen. If you compromise TLS confidentiality you are going to break application security. For most applications a loss in confidentiality in TLS will have an impact in other aspects of security. The third-party will often be able to inject application traffic, although it

Re: [TLS] Technical comment on design draft-rhrd-tls-tls13-visibility-00: why also break integrity/authentication?

2017-11-05 Thread Richard Barnes
I understood Cas to be observing that you could in principle remove confidentiality with regard to the third party to whom keys are being exfiltrated, without also removing integrity and authenticity. So the third party could observe application traffic, but not modify or inject. The solution in d

Re: [TLS] Technical comment on design draft-rhrd-tls-tls13-visibility-00: why also break integrity/authentication?

2017-11-05 Thread Stephen Farrell
Hi Joe, On 06/11/17 01:57, Joseph Salowey wrote: > I'm not sure what use cases you are targeting, but this type of solution > can be dangerous for application security. Most application security models > assume that TLS will provide both confidentiality and authenticity. > Breaking confidentialit

Re: [TLS] Technical comment on design draft-rhrd-tls-tls13-visibility-00: why also break integrity/authentication?

2017-11-05 Thread Joseph Salowey
I'm not sure what use cases you are targeting, but this type of solution can be dangerous for application security. Most application security models assume that TLS will provide both confidentiality and authenticity. Breaking confidentiality will often expose vulnerabilities that can result in esca

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Salz, Rich
➢ At any rate, the discussion of the proposal, if there is to be one, belongs on the mailing list. Having the discussion and coming to a conclusion 1) during a meeting 2) where none of the proponents is present seems like an abuse of process to me I asked for time so that we could dis

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Melinda Shore
On 11/5/17 7:14 AM, Ted Lemon wrote: > My point here is that that's not the reason to reject the document.   > The reason in this case is that there already exist better ways to solve > the problem, and the proposal would clearly make TLS 1.3 worse, even > though there is disagreement about how /mu

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Ted Lemon
On Nov 5, 2017, at 5:09 PM, Salz, Rich wrote: > I didn’t say votes. Sure, but you did say "only the authors are interested" which to me seems to imply a comparison of numbers. Sometimes everybody who's interested in an idea is an author; that doesn't mean it's a bad idea. There have been ca

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Salz, Rich
* Consensus isn't about number of votes. However, I think we can say that although there seems to be some interest in making sure this use case is addressed, there are known ways of addressing it, and little interest in inventing a new way that weakens a new feature of tls 1.3 I didn’t say

Re: [TLS] network-based security solution use cases

2017-11-05 Thread Florian Weimer
* Nancy Cam-Winget: > @IETF99, awareness was raised to some of the security WGs (thanks > Kathleen ☺) that TLS 1.3 will obscure visibility currently afforded in > TLS 1.2 and asked what the implications would be for the security > solutions today. > https://tools.ietf.org/html/draft-camwinget-tls-

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Stephen Farrell
Hiya, On 05/11/17 13:09, Ted Lemon wrote: > Consensus isn't about number of votes. However, I think we can say that > although there seems to be some interest in making sure this use case is > addressed, there are known ways of addressing it, and little interest in > inventing a new way that weak

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Ted Lemon
Consensus isn't about number of votes. However, I think we can say that although there seems to be some interest in making sure this use case is addressed, there are known ways of addressing it, and little interest in inventing a new way that weakens a new feature of tls 1.3 On Nov 5, 2017 14:03,

Re: [TLS] TLS@IETF100: Agenda Requests

2017-11-05 Thread Salz, Rich
So if the only people in favor of it are the draft authors, then we have consensus, right? ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls