[TLS] Re: Adoption Call for Trust Anchor IDs

2025-01-17 Thread Robert Relyea
I do not support adoptions. I believe that arguments have already been layed out in: https://datatracker.ietf.org/doc/draft-jackson-tls-trust-is-nonnegotiable/ As an SSL implementer, I am highly unlikely to include this draft in my library. bob __

[TLS]Re: Curve-popularity data?

2024-06-07 Thread Robert Relyea
On 6/7/24 2:36 PM, Eric Rescorla wrote: On Fri, Jun 7, 2024 at 11:41 AM D. J. Bernstein wrote: Eric Rescorla writes: > I'm struggling to understand what people think is at stake here. The WG will soon be faced with decisions regarding which curve+PQ hybrids to recommend for T

Re: [TLS] [EXTERNAL] Re: Servers sending CA names

2023-04-17 Thread Robert Relyea
On 4/12/23 6:03 PM, Martin Thomson wrote: I think that is also true for NSS, though my experience of this is not thorough. As David notes, client certificates are something of a mess once you step outside a context where the client already knows what it should be sending. On the server side,

Re: [TLS] Proposal to make TLS universal

2023-04-07 Thread Robert Relyea
On 3/27/23 8:28 AM, Yannick LaRue wrote: Furthermore, our proposal to use ECDHE for securing connections without a certificate provides the same level of assurance as the use of low-assurance certificates, such as those issued by Let's Encrypt or Cloudflare, which do not guarantee the identi

Re: [TLS] Getting started, clock not set yet

2022-08-12 Thread Robert Relyea
On 8/9/22 4:12 PM, Eric Rescorla wrote: n Tue, Aug 9, 2022 at 4:08 PM Benjamin Kaduk wrote: On Tue, Aug 09, 2022 at 03:59:01PM -0700, Eric Rescorla wrote: > 3. Are you aware of some other set of rules for certificate issuance that require revocation after the certificate has expir

Re: [TLS] Before we PQC... Re: PQC key exchange sizes

2022-08-09 Thread Robert Relyea
On 8/6/22 11:40 AM, Phillip Hallam-Baker wrote: +1 Anything the WG does has to be proof against Quantum Cryptanalysis and LoW (Laptops on Weekends). The fact that the broken algorithms did not get picked does not change the fact that they made it to the third round. Lumping all the algorithm

Re: [TLS] I-D Action: draft-ietf-tls-ticketrequests-02.txt

2019-10-03 Thread Robert Relyea
On 10/01/2019 04:39 AM, Hubert Kario wrote: On Monday, 30 September 2019 15:56:19 CEST Jeremy Harris wrote: On 30/09/2019 14:36, Christopher Wood wrote: On Mon, Sep 30, 2019, at 6:28 AM, Hubert Kario wrote: Clients must therefore bound the number of parallel connections they init

Re: [TLS] Allow NamedGroups from the server?

2015-11-19 Thread Robert Relyea
On 10/22/2015 06:29 AM, Eric Rescorla wrote: From an implementation perspective, I wouldn't be surprised if client implementations choked on the server sending this. I had to check to see if NSS would do so. It doesn't, but given the way the code is written, it wouldn't have surprised me if it

Re: [TLS] DSA support in TLS 1.3.

2015-08-31 Thread Robert Relyea
On 08/28/2015 08:17 PM, Geoffrey Keating wrote: Jeffrey Walton writes: Also, if DSA was to be supported, one would need to specify how to determine the hash function (use of fixed SHA-1 doesn't fly). And 1024-bit prime is too small. FIPS186-4 (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.