[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-15 Thread Mike Shaver
Yeah, I think we will see more inadvertent logging than malicious, just as we have seen passwords mistakenly deposited in logs for approximately as long as we have had both logs and passwords. One challenge with SSLKEYLOG is that there’s no way without very system-specific inspection to detect whe

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-04 Thread Amir Omidi
It doesn’t necessarily need to be malicious. With how much of software deployment being massive YAML files with tons of environment variables, mistakenly including this won’t be that difficult. On Sun, Aug 4, 2024 at 07:00 Ilari Liusvaara wrote: > On Sat, Aug 03, 2024 at 02:38:29PM -0700, Christ

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-04 Thread Ilari Liusvaara
On Sat, Aug 03, 2024 at 02:38:29PM -0700, Christian Huitema wrote: > > The security considerations of > https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/ are pretty > clear, but the discussion pointed out that environment variables can be > installed without knowledge of most users. More

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread Christian Huitema
On 8/3/2024 11:03 AM, Eric Rescorla wrote: ... The main SSLKEYLOGFILE document already contains the following applicability statement [1], which also is referenced here in S 5:      The artifact that this document describes - if made available to      entities other than endpoints - complet

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread Stephen Farrell
Hiya, On 03/08/2024 19:03, Eric Rescorla wrote: I'd like to make sure we're all on the same page about this draft. The IESG has already approved the original TLS document on SSLKEYLOGFILE [0], which contains the keying material necessary to decrypt the connection. It's currently in the RFC Edit

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread Andrei Popov
opov Sent: Donnerstag, 25. Juli 2024 18:30 To: Sean Turner ; TLS List Subject: [TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH I do not support adoption, because I believe the IETF should not standardize tools and techniques for decrypting TLS-protected data. It is harder

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread Eric Rescorla
Hi folks, I'd like to make sure we're all on the same page about this draft. The IESG has already approved the original TLS document on SSLKEYLOGFILE [0], which contains the keying material necessary to decrypt the connection. It's currently in the RFC Editor Queue. The draft under discussion wou

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread Tim Bray
I’m not a TLS insider but I’ve been watching this discussion, and… On Aug 3, 2024 at 9:36:16 AM, hannes.tschofenig=40gmx@dmarc.ietf.org wrote: > Hence, this is not a mechanism that allows a third party in the middle of > the network communication to somehow decrypt traffic. It is a tool for

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-03 Thread hannes . tschofenig=40gmx . net
, sounds good to me though. Ciao Hannes -Original Message- From: Andrei Popov Sent: Donnerstag, 25. Juli 2024 18:30 To: Sean Turner ; TLS List Subject: [TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH I do not support adoption, because I believe the IETF should not

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-07-25 Thread Stephen Farrell
Hiya, On 25/07/2024 17:30, Andrei Popov wrote: I do not support adoption, because I believe the IETF should not standardize tools and techniques for decrypting TLS-protected data. It is harder for a TLS implementer to reject requests for IETF- blessed functionality. Same here. (As long as

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-07-25 Thread Andrei Popov
I do not support adoption, because I believe the IETF should not standardize tools and techniques for decrypting TLS-protected data. It is harder for a TLS implementer to reject requests for IETF-blessed functionality. (As long as this remains on the Informational track, I believe it's somewhat