Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-08 Thread Hannes Tschofenig
Hi Peter, too bad that you are not attending the upcoming IETF meeting in person. I am sure that others would like to hear your thoughts about an end-to-end security solution that is even better than the TLS 1.3 protocol. At least I am interested. Maybe you can share something on the list. Ciao

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Alex C
If the embedded device is capable of running TLS anyway (e.g. fast enough to do RSA) why not have the phone act as a dumb proxy? However I see the draft has some additional scenarios where it makes sense, such as where the device must work with an off-the-shelf proxy that only speaks HTTP. On Wed

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Peter Saint-Andre
On 11/7/17 8:15 AM, Hannes Tschofenig wrote: > FWIW: I can tell you what the threat model was with the layered TLS work. > > Let me give you a very specific example. Imagine a Bluetooth Low Energy > device that communicates via a phone to a cloud-based service. The > communication from the phone t

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Yoav Nir
Hi, Hannes. I think it makes sense if the middlebox (whether a TLS proxy or a phone) cannot perform a MitM attack against the internal TLS. This can be achieved by having separate trust anchors for the application vs the ones used for HTTPS, specifically not including any “proxy CA certificate”

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Hannes Tschofenig
FWIW: I can tell you what the threat model was with the layered TLS work. Let me give you a very specific example. Imagine a Bluetooth Low Energy device that communicates via a phone to a cloud-based service. The communication from the phone to the cloud uses HTTPS. The communication from the BLE

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Alex C
What exactly is the threat model here? Are you trying to hide a connection from a reverse proxy at the server end? If so, the server operator should not have deployed a reverse proxy in the first place. Are you trying to hide from a MITM proxy that supplies its own certificate? If so, then what p

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-06 Thread Owen Friel (ofriel)
From: Ben Schwartz [mailto:bem...@google.com] Sent: Tuesday 31 October 2017 21:17 To: Owen Friel (ofriel) Cc: Richard Barnes ; Subject: Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt On Tue, Oct 31, 2017 at 5:03 PM, Owen Friel (ofriel) mailto:ofr...@cisco.com

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-01 Thread Patrick McManus
Some feedback, in no particular order: * have a hard think about handshake/termination loads. istm this scheme devolves pretty quickly to a termination per object HTTP/1.0 style so you'll be fairly quickly looking to do some kind of multiplexing and reuse on top of it for the same reasons HTTP evo

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-31 Thread Stephen Farrell
Hi Owen, On 31/10/17 21:03, Owen Friel (ofriel) wrote: >> Interesting. One bit puzzles me: wouldn't the new content-type >> give the game away and cause middleboxes to block this? >> >> S. >> > [ofriel] The intention isn’t to try and obscure the fact that there > is an ATLS session. Even if th

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-31 Thread Owen Friel (ofriel)
> -Original Message- > From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Stephen Farrell > Sent: 30 October 2017 22:56 > To: Richard Barnes ; > Subject: Re: [TLS] New Version Notification for > draft-friel-tls-over-http-00.txt > > > > On 30/10/

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-31 Thread Owen Friel (ofriel)
From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Ben Schwartz Sent: 31 October 2017 01:35 To: Richard Barnes Cc: Subject: Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt On Mon, Oct 30, 2017 at 7:02 PM, Richard Barnes mailto:r...@ipv.sx>> wrote: It re

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Ben Schwartz
On Mon, Oct 30, 2017 at 7:02 PM, Richard Barnes wrote: > It requires awareness in the following sense: If by chance the client is > in a nice, open network and the base TLS connection goes directly to the > server, CONNECT is kind of unnatural; you would want the client to do > something differen

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Mark Nottingham
Please consult with the HTTP WG *before* you start work in this area. Thanks, > On 31 Oct 2017, at 9:17 am, Richard Barnes wrote: > > Hey TLS folks, > > Owen, Max, and I have been kicking around some ideas for how to make secure > connections in environments where HTTPS is subject to MitM /

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Richard Barnes
It requires awareness in the following sense: If by chance the client is in a nice, open network and the base TLS connection goes directly to the server, CONNECT is kind of unnatural; you would want the client to do something different in that case. You're correct that you *could* configure the se

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Stephen Farrell
On 30/10/17 22:17, Richard Barnes wrote: > Hey TLS folks, > > Owen, Max, and I have been kicking around some ideas for how to make secure > connections in environments where HTTPS is subject to MitM / proxying. Interesting. One bit puzzles me: wouldn't the new content-type give the game away an

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Richard Barnes
But I agree, it would be good to have some more clarity around use cases and why not other solutions. On Mon, Oct 30, 2017 at 6:37 PM, Richard Barnes wrote: > HTTP CONNECT is not great for some use cases because it requires the app > to be aware that it's dealing with a proxy. It's simpler if y

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Richard Barnes
HTTP CONNECT is not great for some use cases because it requires the app to be aware that it's dealing with a proxy. It's simpler if you can just have one code path that works whether your TLS is intermediated or not. With the solution outlined in the draft, you can just always ignore the certifi

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-10-30 Thread Richard Barnes
Hey TLS folks, Owen, Max, and I have been kicking around some ideas for how to make secure connections in environments where HTTPS is subject to MitM / proxying. The below draft lays out a way to tunnel TLS over HTTPS, in hopes of creating a channel you could use when you really need things to be