Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Daniel Migault
I support the proposal from Viktor. It is important to minimize the involved resource and provide the client the ability to explicitly inform the server its policy. As explained above, this mechanism comes with no additional complexity and address a full range of applications. See below my commen

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Viktor Dukhovni
On Tue, Jan 21, 2020 at 05:46:10PM -0500, Viktor Dukhovni wrote: > > 2. The additional cost of multiple tickets seems extraordinarily > >small, so I am not at all persuaded that there is enough value in > >this use case to justify adding new protocol machinery, even > >ignoring point (

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Viktor Dukhovni
On Tue, Jan 21, 2020 at 01:17:59PM -0800, Eric Rescorla wrote: > I would make several points here: > > 1. RFC 8446 explicitly discourages ticket reuse >(https://tools.ietf.org/rfcmarkup?doc=8446#appendix-C.4). so we >should not be designing an extension to enable reuse. While it's >po

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Eric Rescorla
I would make several points here: 1. RFC 8446 explicitly discourages ticket reuse (https://tools.ietf.org/rfcmarkup?doc=8446#appendix-C.4). so we should not be designing an extension to enable reuse. While it's potentially true that some applications do not benefit from non-reuse, crea

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Salz, Rich
Viktor and I spoke in more detail. The use-case he brings up makes more sense to me now. The key observation is that this is not about a "client" in the conventional (or browser) sense, but rather more like a peer-to-peer kind of thing, where the client is just the one who initiates a connectio

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Viktor Dukhovni
On Tue, Jan 21, 2020 at 03:24:50PM +, Salz, Rich wrote: > >This is clearly a subjective call, so I'll step back now. > > Yes it is. But I will say that I agree with you and think the > cleverness introduced by the "255 is magic" proposal is not warranted. Really? TLS has no sentinel cod

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Viktor Dukhovni
On Tue, Jan 21, 2020 at 07:17:05AM -0800, Eric Rescorla wrote: > I agree with Martin that this is unnecessary complexity. The objections stated are non-responsive, and dismiss a valid use-case. There is ZERO additional complexity. - Servers will already range-check the requested ticket count

Re: [TLS] External PSK design team // Scope for "Low-entropy PSK" applications

2020-01-21 Thread Björn Haase
A question regarding the scope of the PSK design team: In my opinion there is definitely a need for a secure solution for “low-entropy PSK” approaches. It seems that this topic does not seem to be within the scope that Sethi Mohit did have in mind. If this topic would be out of the scope of the

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Salz, Rich
>This is clearly a subjective call, so I'll step back now. Yes it is. But I will say that I agree with you and think the cleverness introduced by the "255 is magic" proposal is not warranted. ___ TLS mailing list TLS@ietf.org https://www.ietf.org

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Eric Rescorla
I agree with Martin that this is unnecessary complexity. In addition, I would note that switching to a new ticket *does* help even if the server is using the same STEK because it improves privacy. -Ekr On Tue, Jan 21, 2020 at 12:58 AM Martin Thomson wrote: > On Tue, Jan 21, 2020, at 16:54, Vi

Re: [TLS] External PSK design team

2020-01-21 Thread Russ Housley
Sean: I can help with this design team. Russ > On Jan 20, 2020, at 11:01 PM, Sean Turner wrote: > > At IETF 106, we discussed forming a design team to focus on external PSK > management and usage for TLS. The goal of this team would be to produce a > document that discusses considerations f

Re: [TLS] External PSK design team

2020-01-21 Thread Eric Rescorla
I am willing to contribute. -Ekr On Tue, Jan 21, 2020 at 2:50 AM Jonathan Hoyland wrote: > Hi All, > > This is something I'm very interested in. > > Definitely want to participate. > > Regards, > > Jonathan > > On Tue, 21 Jan 2020 at 10:04, Mohit Sethi M 40ericsson@dmarc.ietf.org> wrote:

Re: [TLS] External PSK design team

2020-01-21 Thread Mohit Sethi M
Just to clarify myself further, I would not want us to change the TLS 1.3 protocol. I would rather have this design team produce an informational document that discusses considerations when using external PSKs in different settings, as well as, privacy of PSK identities and possible mitigations

Re: [TLS] External PSK design team

2020-01-21 Thread Mohit Sethi M
Thanks for clarifying. I would still like that this design team to have a narrow scope. As Sean said in his initial email: > forming a design team to focus on external PSK management and usage for TLS --Mohit On 1/21/20 12:40 PM, Björn Haase wrote: >> Mohit Sethi M wrote: >> I would let CFRG d

Re: [TLS] External PSK design team

2020-01-21 Thread Jonathan Hoyland
Hi All, This is something I'm very interested in. Definitely want to participate. Regards, Jonathan On Tue, 21 Jan 2020 at 10:04, Mohit Sethi M wrote: > I would let CFRG deal with the PAKE selection process: > https://mailarchive.ietf.org/arch/msg/cfrg/-a1sW3jK_5avmb98zmFbCNLmpAs > and not h

Re: [TLS] External PSK design team

2020-01-21 Thread Björn Haase
> Mohit Sethi M wrote: > I would let CFRG deal with the PAKE selection process: > and not have this design team spend time and energy on designing PAKEs. That was not what I was suggesting. Instead, I was suggesting to *incorporate* the results of the selection process into TLS, such that there

Re: [TLS] External PSK design team

2020-01-21 Thread Mohit Sethi M
I would let CFRG deal with the PAKE selection process: https://mailarchive.ietf.org/arch/msg/cfrg/-a1sW3jK_5avmb98zmFbCNLmpAs and not have this design team spend time and energy on designing PAKEs. --Mohit On 1/21/20 11:52 AM, Björn Haase wrote: > Hello to all, > > I am also willing to contribu

Re: [TLS] External PSK design team

2020-01-21 Thread Björn Haase
Hello to all, I am also willing to contribute. My concern is that I observe that in some industrial control applications, PSK mechanisms (that actually require high-entropy keys) are (mis)-used in conjunction with TLS, where the PSK is actually of insufficient entropy (maybe derived only from a

Re: [TLS] External PSK design team

2020-01-21 Thread Mohit Sethi M
I am certainly interested and willing to contribute. We need some consensus on whether PSKs can be shared with more than 2 parties, whether the parties can switch roles, etc. EMU is going to work on EAP-TLS-PSK and the question of privacy/identities will pop-up there too. --Mohit On 1/21/20 7

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Viktor Dukhovni
On Tue, Jan 21, 2020 at 07:57:27PM +1100, Martin Thomson wrote: > On Tue, Jan 21, 2020, at 16:54, Viktor Dukhovni wrote: > > There's no need to exclude valid use-cases. The refined proposal > > is rather non-invasive, and handles this case cost-effectively > > on clients that re-use tickets (and

Re: [TLS] WGLC for draft-ietf-tls-ticketrequests

2020-01-21 Thread Martin Thomson
On Tue, Jan 21, 2020, at 16:54, Viktor Dukhovni wrote: > There's no need to exclude valid use-cases. The refined proposal > is rather non-invasive, and handles this case cost-effectively > on clients that re-use tickets (and don't use early-data, ...). I don't find your arguments persuasive. Thi

[TLS] ESNI Android Implementation

2020-01-21 Thread Justice Parham
Hello tlsWG, First I would like to introduce myself to you. My name is Justice Parham (github mrsylerpowers) a current Senior Undergraduate Student at North Carolina A&T State University. As my senior project I decided to create a android system wide implementation of the ESNI Draft. I am planning