, in which case, we should chat more.)
No damage at all.
You can leave it as-is.
So, yes, I've added 7525 to the list of UPDATEd stuff in my copy
and made a change of intended status to BCP. (I bet a beer we'll
change that again >1 time:-)
:)
--
Julien ÉLIE
« Si l'art n
ion 1.2 over earlier versions of TLS.
That's why I thought RFC 8143 was already requiring not to use TLS 1.1.
Incidentally, in the Abstract of draft-ietf-tls-oldversions-deprecate,
it is said that this document updates RFC 7525, but RFC 7525 does not
appear in the Updates list. Shouldn
update RFC 4642. It is no longer useful.
Are you OK with this analysis?
--
Julien ÉLIE
« Le rire est une chose sérieuse avec laquelle il ne faut pas
plaisanter. » (Raymond Devos)
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
recommendations for
certificate validation.
Yet, EAP-TLS is wide-spread, and notably used with WPA and WPA2.
Shouldn't it be updated in favour of following RFC 7525 (BCP for TLS)
and RFC 6125 (guideline for certificate validation)?
--
Julien ÉLIE
« The following two statements are usu
nd prevent people from being confused by SSL 2 and 3.
P.-S.: I would also suggest to use the TLS 1.3 name for "TLS 1.2 LTS".
--
Julien ÉLIE
« Ce que j'aime chez vous, c'est que vous savez jusqu'où on va trop
loin. » (Cocteau)
_
st TLS libraries.
So, if the consensus is to prevent people who speak about or work on TLS
from constantly viewing the SSL name, will forthcoming software releases
change their name?
Otherwise, confusion keeps being sustained...
--
Julien ÉLIE
« En voyant le
TLS extension
but
as a real 1.3 version of the 1.x series?
--
Julien ÉLIE
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
2.0 for DTLS.
Any comments about that proposal?
--
Julien ÉLIE
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
y the needs of security?
We believe it would work better than complexifying the simple COMPRESS
command, and that it no longer introduces potential security issues in
the default configuration (whereas the previous version did).
--
Julien ÉLIE
« A man inserted an 'ad' in the class
on, in case some of the operations the client
wanted to perform are accepted by the server even if the client is
unauthenticated.
Does it answer your question?
--
Julien ÉLIE
« Contra factum non datur argumentum. »
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
ression dictionary after every response.
--
Julien ÉLIE
« Ta remise sur pied lui a fait perdre la tête ! » (Astérix)
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
Last year, in September 2015, we spoke about the removal of TLS-level
compression in TLS 1.2.
Of course one should read "TLS 1.3".
--
Julien ÉLIE
« I don't worry about terrorism. I was married for two years. »
(Sam Kinison)
___
T
T be used along with
compression.
Thanks again for your useful comments!
--
Julien ÉLIE
« Pourvu que ça dure ! » (Letizia Bonaparte)
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
(in other words, AUTHINFO is no longer
valid after a successful use of COMPRESS).
Thanks again guys for having put us to work on that NNTP extension!
--
Julien ÉLIE
« Aequum est ut cuius participauit lucrum, participet et damnun. »
___
TLS mailing
mpatible
with a TLS library.
[...]
What we need for NNTP is a build without security, but with compression
option.
And it is probably the case for protocols other than NNTP.
The current discussion focuses on NNTP but I bet the same question can
arise from other protocols.
--
Julien ÉLIE
ticles requires more
band-width. Not much for a text-only feed of course. As for a full
binary feed, compression will be welcome (a news server may inject
binaries and send them to dozens of peers at the same time, which
consumes band-width).
--
Julien ÉLIE
« – Je ne peux que vous pr
?
Thanks for that checkpoint in the discussion!
I think the counter-arguments given so far all fall in that sentence.
Maybe we could say "if TLS 1.2 has a flaw or if I want to benefit of the
new facilities provided with TLS 1.3" to be more general.
--
Julien ÉLIE
« – Je ne pe
need to get rid of all of the insecure modes so all
configurations are secure (at least to start).
This is compatible with keeping compression as a mode that can be
explicitly activated.
--
Julien ÉLIE
« Tant qu'il y a des marmites, il y a de l'espoir !
ompression, according to their needs.
It is what happened with BEAST: Firefox and Chrome disabled TLS
compression.
--
Julien ÉLIE
« Tant qu'il y a des marmites, il y a de l'espoir ! » (Astérix)
___
TLS mailing list
TLS@ietf.org
https://
egotiate a TLS security
layer upon connection. They do not use STARTTLS in that case; and
clients can authenticate with AUTHINFO, with an active TLS layer.
--
Julien ÉLIE
« Tant qu'il y a des marmites, il y a de l'espoir ! » (Astérix)
___
TLS m
x27;t it?
Or AUTHINFO is not a valid command after the use of COMPRESS.
--
Julien ÉLIE
« Etna : lave dévalante. »
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
lysis would predict that HTTP isn't vulnerable.
I don't understand that point for AUTHINFO.
NNTP only answers "281 Authentication succeeded" or "481 Authentication
failed" here, whereas HTTP response bodies are far more complex and part
of the request may be reflecte
PASS badpassword
481 Authentication failed
How compression would make NNTP weaker?
(Brute-force attack is still necessary, even with compression enabled.)
--
Julien ÉLIE
« Etna : lave dévalante. »
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/ma
S
command with possible arguments), that could be used by clients?
Well, it will require some work to specify it. Not to speak of its
implementation afterwards.
I bet other protocols would also need similar new specifications to
explain how compression can be enabled.
--
Julien ÉLIE
« E
nce Firefox, Apache...)
Do we know how many protocols currently suffer from CRIME?
Maybe a best practice could be suggested by UTA for the implementation
of TLS in software, to disable compression if vulnerable. And for the
others, to implement a way to enable/disable compression in case one da
. Many thanks for your explanation.
--
Julien ÉLIE
« Quand on aime on ne compte pas… Ça tombe bien, je suis mauvaise
en calcul ! »
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
al!
I will ask in the UTA list to have their opinion about what should be done.
Have a nice week-end,
--
Julien ÉLIE
« Petite annonce : Sourd rencontrerait sourde pour terrain
d'entente. »
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailma
is not always necessary), as RFC 4642 recalls:
The STARTTLS command is usually used to initiate session security,
although it can also be used for client and/or server certificate
authentication and/or data compression.
--
Julien ÉLIE
« Petite annonce : Sourd rencontrerait sourde pour
gain to all who answered,
--
Julien ÉLIE
« Audaces fortuna iuvat. » (inspiré de Virgile, pour les chauves)
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
rks well enough, and
clients can if they desire more security restrict which CAs they
are willing to accept as issuers of the fixed peer's certificate.
Thanks again for having shared your thoughts. We'll take them into
account (if of course we update RFC 4642).
--
Julien ÉLIE
« Audac
cification, though.
--
Julien ÉLIE
« Vous savez, les idées, elles sont dans l'air. Il suffit que
quelqu'un vous en parle de trop près, pour que vous les
attrapiez ! » (Raymond Devos)
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
ervers. TLS is more wide-spread for
the connection of a news client to a news server so as to read or post
articles.
--
Julien ÉLIE
« Vous savez, les idées, elles sont dans l'air. Il suffit que
quelqu'un vous en parle de trop près, pour que vous les
att
phers still be explicitly mentioned, or the paragraph
totally removed? (RFC 5246 that standardizes TLS 1.2 already has a
Section 9 about the mandatory TLS_RSA_WITH_AES_128_CBC_SHA cipher suite.)
Of course, if you see other things that should be amended in RFC 4242,
do not hesitate to tell.
Thanks be
33 matches
Mail list logo