Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-06 Thread Sean Turner
On Apr 03, 2016, at 22:24, Dan Harkins wrote: > > I wonder if you have thought this through or prepped the > stuckee? During Wed’s session the chairs took the action to prep the “stuckee(s)”. Those other stuckee(s) include: - Our AD (Stephen for the next year): is following along. - The Ind

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-06 Thread Dang, Quynh (Fed)
not right to me. Regards, Quynh. From: TLS on behalf of Hannes Tschofenig Sent: Thursday, March 31, 2016 9:45 AM To: Sean Turner; Subject: Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites Hi Sean, What is the

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-06 Thread Sean Turner
On Apr 06, 2016, at 12:21, Aaron Zauner wrote: > > Hi, > >> On 30 Mar 2016, at 03:53, Sean Turner wrote: >> >> Hi! >> >> In Yokohama, we discussed changing the IANA registry assignment rules for >> cipher suites to allow anyone with a stable, publicly available, peer >> reviewed reference d

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-06 Thread Aaron Zauner
Hi, > On 30 Mar 2016, at 03:53, Sean Turner wrote: > > Hi! > > In Yokohama, we discussed changing the IANA registry assignment rules for > cipher suites to allow anyone with a stable, publicly available, peer > reviewed reference document to request and get a code point and to add an > “IETF

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-05 Thread Dan Harkins
On Tue, April 5, 2016 7:42 am, Adam Langley wrote: > On Tue, Apr 5, 2016 at 4:55 PM, Peter Gutmann > wrote: >> How hard can it be to implement TLS-PSK? I did it in a few hours in my >> crypto >> library. > > This is getting off topic (which is my fault) but, for us, it wouldn't > be "just" imple

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-05 Thread Adam Langley
On Tue, Apr 5, 2016 at 4:55 PM, Peter Gutmann wrote: > How hard can it be to implement TLS-PSK? I did it in a few hours in my crypto > library. This is getting off topic (which is my fault) but, for us, it wouldn't be "just" implementing PSK. We would need to evangelise it sufficiently with eno

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-05 Thread Peter Gutmann
Adam Langley writes: >Ideas for supporting this case (i.e. the "I want to do HTTPS to my router" >problem) in browsers have done the rounds a few times. This isn't for HTTPS to a router, it's to SCADA devices. The preferred interface to them is HTTPS, but since browsers have refused to implemen

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Adam Langley
On Mon, Apr 4, 2016 at 9:39 PM, Peter Gutmann wrote: > Because they have neither a DNS name nor a fixed IP address. I ran into this > just last week with a customer, they couldn't use certs for their embedded > devices and couldn't use PSK because the browser vendors have chosen not to > support

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Mon, April 4, 2016 10:46 am, Phil Lello wrote: >> >> >> Usually what happens is the server generates a self-signed >> certificate >> >> and the apps are given some "username" and "password" and the app >> >> ignores the unauthenticated nature of the TLS connection and sends >> >> the u/p crede

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Phil Lello
> > >> Usually what happens is the server generates a self-signed certificate > >> and the apps are given some "username" and "password" and the app > >> ignores the unauthenticated nature of the TLS connection and sends > >> the u/p credential on through. > > > > Isn't this use case more of an arg

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Mon, April 4, 2016 8:50 am, Phil Lello wrote: > On Mon, Apr 4, 2016 at 3:36 PM, Dan Harkins wrote: > >> >> Usually what happens is the server generates a self-signed certificate >> and the apps are given some "username" and "password" and the app >> ignores the unauthenticated nature of the T

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Kaduk, Ben
On 4/4/16, 12:50, "Phil Lello" wrote: > > >On Mon, Apr 4, 2016 at 3:36 PM, Dan Harkins > wrote: > > > > >Isn't this use case more of an argument for an updated auth-digest to use >something better than MD5? I'm not convinced MITM is a real concern for a >typical IoT environment (however that's

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Phil Lello
On Mon, Apr 4, 2016 at 3:36 PM, Dan Harkins wrote: > > > On Mon, April 4, 2016 7:17 am, Watson Ladd wrote: > > Usually what happens is the server generates a self-signed certificate > and the apps are given some "username" and "password" and the app > ignores the unauthenticated nature of the TLS

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Peter Gutmann
Watson Ladd writes: >Actually, PKI certs are not required. There is an extension to support use of >bare keys for authentication. And if you can provision with a shared secret, >you can provision with a private key. And how many browsers support that? Peter.

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Watson Ladd
On Mon, Apr 4, 2016 at 7:39 AM, Peter Gutmann wrote: > Watson Ladd writes: > >>Why can't embedded devices use certificates? > > Because they have neither a DNS name nor a fixed IP address. I ran into this > just last week with a customer, they couldn't use certs for their embedded > devices and

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Peter Gutmann
Watson Ladd writes: >Why can't embedded devices use certificates? Because they have neither a DNS name nor a fixed IP address. I ran into this just last week with a customer, they couldn't use certs for their embedded devices and couldn't use PSK because the browser vendors have chosen not to s

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Mon, April 4, 2016 7:17 am, Watson Ladd wrote: > On Mon, Apr 4, 2016 at 7:05 AM, Dan Harkins wrote: >> >> >> On Thu, March 31, 2016 10:51 am, Stephen Farrell wrote: >>> >>> If smaller devices don't use algorithms that can be used to talk to >>> random servers on the Internet, then they are ch

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Salz, Rich
> > Not always; ISO et al. > > That's why I said "basically"; it's a qualifier. I know; I was trying to emphasize, not correct :). > But keep in mind what kind of stable, publicly available document needs to > be published: a description not of the algorithm but of how that algorithm > get

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Watson Ladd
On Mon, Apr 4, 2016 at 7:05 AM, Dan Harkins wrote: > > > On Thu, March 31, 2016 10:51 am, Stephen Farrell wrote: >> >> If smaller devices don't use algorithms that can be used to talk to >> random servers on the Internet, then they are choosing to not try to >> get interop. That seems like a shame

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Thu, March 31, 2016 10:51 am, Stephen Farrell wrote: > > If smaller devices don't use algorithms that can be used to talk to > random servers on the Internet, then they are choosing to not try to > get interop. That seems like a shame to me, unless there's a really > good reason and IMO, mostl

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Sun, April 3, 2016 7:24 pm, Salz, Rich wrote: > >> A stable, publicly available document is basically an RFC. > > Not always; ISO et al. That's why I said "basically"; it's a qualifier. But keep in mind what kind of stable, publicly available document needs to be published: a descripti

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-03 Thread Salz, Rich
> A stable, publicly available document is basically an RFC. Not always; ISO et al. ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-03 Thread Dan Harkins
Hi Sean, In general I support this but A stable, publicly available document is basically an RFC. So when the TLS WG says no that means asking an AD to sponsor or putting it into the Independent Stream process. So what it looks like you're doing is punting this problem into the lap of

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Andrei Popov
iginal Message- From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Stephen Farrell Sent: Thursday, March 31, 2016 10:52 AM To: Hannes Tschofenig ; Salz, Rich ; Kaduk, Ben ; Subject: Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites If smaller devices don't

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Rick van Rein
Hi, > I am just a little bit worried that everything developed for the IoT > enviroment is quite likely labled as not recommended by the IETF in this > registry because of the Web focus in this group. > RFC 5246 speaks of "Application Profiles" and it seems like this discussion that started to sim

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Stephen Farrell
If smaller devices don't use algorithms that can be used to talk to random servers on the Internet, then they are choosing to not try to get interop. That seems like a shame to me, unless there's a really good reason and IMO, mostly there isn't, at the ciphersuite level. I would hope we all won't

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Eric Rescorla
Hannes, Aside from JPAKE, which algorithms are you concerned about? -Ekr On Thu, Mar 31, 2016 at 10:40 AM, Hannes Tschofenig < hannes.tschofe...@gmx.net> wrote: > I can see some value in having this IANA registry list for ciphersuites > in the way being proposed (even if it may be interpreted

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Hannes Tschofenig
I can see some value in having this IANA registry list for ciphersuites in the way being proposed (even if it may be interpreted differently by different audiences). There have been, of course, too many algorithms used only in specific countries and those substantially increased the ciphersuite lis

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Salz, Rich
> Interesting idea. You see this IANA registry more as the mandatory to > implement algorithm list (for Web apps). I don't. But lots of outsiders do, and I know they exert pressure on various projects and TLS/AD "leadership". I've only had a little bit of it via openssl compared to those folks

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Hannes Tschofenig
Hi Rich, On 03/31/2016 07:17 PM, Salz, Rich wrote: > I am very confident it will help. For example, it now becomes a > reasonable position for most TLS stacks to include only Y > ciphersuites in their default source or build or deploy methods. It > will also have an effect on reducing clientHell

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Benjamin Kaduk
Well, "most people [in the world" do not care about any documents the IETF puts out. I am not sure what population of people you are actually trying to make a statement about. I am not confident that adding this column will actually have a useful impact, but I think the experiment is worth perfor

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Eric Rescorla
The primary purpose of this compromise is to unjam the many requests for code points that otherwise clog the WG and expert review process. I believe it will at least do that. -Ekr On Thu, Mar 31, 2016 at 10:14 AM, Benjamin Kaduk wrote: > Well, "most people [in the world" do not care about any

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Salz, Rich
> I am not confident that adding this column will actually have a useful impact, > but I think the experiment is worth performing. I am very confident it will help. For example, it now becomes a reasonable position for most TLS stacks to include only Y ciphersuites in their default source or b

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Hannes Tschofenig
In essence you are saying that most people are not going to care about the Y/N in the IANA table anyway. Somewhat similar to people not understanding the difference between the different types of RFCs. That sounds pragmatic. Ciao Hannes On 03/31/2016 06:52 PM, Benjamin Kaduk wrote: > On 03/31/20

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Benjamin Kaduk
On 03/31/2016 11:20 AM, Hannes Tschofenig wrote: > Hi Ben, > > just think about the mentioned JPAKE extension: what type of deployment > can you expect? It is something that Thread decided to use. Will Thread, > as a mesh networking technology, be successful and widely be deployed? > We don't know

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Salz, Rich
> 802.15.4 then it will be fairly widely used in the IoT sector. I am sure the > authors of the Thread specifications (and the members of the Thread > consortium) expect their stuff to be widely used (in IoT -- not on the Web). They can get a code-point but not a Y since there is no IETF consensus

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Hannes Tschofenig
Hi Ben, just think about the mentioned JPAKE extension: what type of deployment can you expect? It is something that Thread decided to use. Will Thread, as a mesh networking technology, be successful and widely be deployed? We don't know yet but if it becomes a technology of choice for use with IE

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Benjamin Kaduk
On 03/31/2016 08:45 AM, Hannes Tschofenig wrote: > Hi Sean, > > What is the requirement for adding a spec to the list with the value > IETF Recommended = "Y" (or to change an entry from "Y" to "N")? > > You mention two conditions: > > * IETF has consensus > * Are reasonably expected to be support

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Salz, Rich
> A black/white > distinction will probably lead to a lot of discussion, and different > implementation purposes could call for more subtlety. I strongly thing it's the exact opposite. A simple "yes an IETF WG came to consensus on this" is much simpler than trying to debate various shades of g

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Rick van Rein
Hi, In general I think this is a good form of relaxation. However, > > Cipher suites marked with a “Y” the IETF has consensus on An alternative could be to mark the entry with the RFC 5226 level of the documentation, and indicate what levels are acceptable. A black/white distinction will prob

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Dang, Quynh (Fed)
consensus: changes to IANA registry rules for cipher suites Hi Sean, What is the requirement for adding a spec to the list with the value IETF Recommended = "Y" (or to change an entry from "Y" to "N")? You mention two conditions: * IETF has consensus * Are reaso

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Salz, Rich
> What is the requirement for adding a spec to the list with the value IETF > Recommended = "Y" (or to change an entry from "Y" to "N")? I believe the primary concern is *not* to address IETF products, but rather non-IETF organizations that want a codepoint. _

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Hannes Tschofenig
Hi Sean, What is the requirement for adding a spec to the list with the value IETF Recommended = "Y" (or to change an entry from "Y" to "N")? You mention two conditions: * IETF has consensus * Are reasonably expected to be supported by widely used implementations such as open-source libraries

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Martin Thomson
On 30 March 2016 at 12:53, Sean Turner wrote: > Cipher suites marked with a “Y” the IETF has consensus on As long as that consensus is for the "Y", then this is a great plan. I think that there's consensus on a lot of "N" entries too. However, if there is any dispute or doubt, it's still "N".

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Stephen Farrell
On 31/03/16 00:22, Eric Rescorla wrote: > We already have a proposal for this. Please see: > http://tlswg.github.io/tls13-spec/#iana-considerations I like, support and will buy that a beer:-) Thanks, S. smime.p7s Description: S/MIME Cryptographic Signature ___

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Eric Rescorla
On Wed, Mar 30, 2016 at 4:16 PM, Stephen Farrell wrote: > > (with no hats, except the one irritated with loadsa ciphersuites:-) > > On 30/03/16 21:26, Yoav Nir wrote: > > That brings up another question. How do things move from “approved” > > to “not-approved”? Does it require a diediedie documen

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Stephen Farrell
(with no hats, except the one irritated with loadsa ciphersuites:-) On 30/03/16 21:26, Yoav Nir wrote: > That brings up another question. How do things move from “approved” > to “not-approved”? Does it require a diediedie document? What > happens when we decide that 3DES is just too limited and

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Rick van Rein
Hello, > In Yokohama, we discussed changing the IANA registry assignment rules > for cipher suites Has a similar thing been discussed for TLS Extensions as well? That list now requires "IETF Consensus", and it doesn't even have Private and Experimental allocations, let alone a portion with "Spec

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Bill Frantz
+1 for the change. On 3/30/16 at 1:26 PM, ynir.i...@gmail.com (Yoav Nir) wrote: That brings up another question. How do things move from “approved” to “not-approved”? Does it require a diediedie document? What happens when we decide that 3DES is just too limited and there’s not good reason to

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Benjamin Kaduk
On 03/30/2016 01:03 PM, Sean Turner wrote: > I apologize in advance; this is about process so it’s long. > It seems correct and reasonably comprehensive. > This definition gives power/discretion to the designated expert (it’s ekr > btw). We can: > > a) defer to the expert's judgement (some of w

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Dave Garrett
On Wednesday, March 30, 2016 03:20:08 pm Ilari Liusvaara wrote: > On Wed, Mar 30, 2016 at 12:05:26PM -0400, Daniel Kahn Gillmor wrote: > > On Wed 2016-03-30 11:33:09 -0400, Benjamin Kaduk wrote: > > > I am not sure that we want to be in the business of explicitly marking > > > things as insecure ot

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Yoav Nir
> On 30 Mar 2016, at 10:44 PM, Daniel Kahn Gillmor > wrote: > > On Wed 2016-03-30 15:20:08 -0400, Ilari Liusvaara wrote: >> On Wed, Mar 30, 2016 at 12:05:26PM -0400, Daniel Kahn Gillmor wrote: >>> On Wed 2016-03-30 11:33:09 -0400, Benjamin Kaduk wrote: I am not sure that we want to be in t

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Daniel Kahn Gillmor
On Wed 2016-03-30 15:20:08 -0400, Ilari Liusvaara wrote: > On Wed, Mar 30, 2016 at 12:05:26PM -0400, Daniel Kahn Gillmor wrote: >> On Wed 2016-03-30 11:33:09 -0400, Benjamin Kaduk wrote: >> > I am not sure that we want to be in the business of explicitly marking >> > things as insecure other than o

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Ilari Liusvaara
On Wed, Mar 30, 2016 at 12:05:26PM -0400, Daniel Kahn Gillmor wrote: > On Wed 2016-03-30 11:33:09 -0400, Benjamin Kaduk wrote: > > I am not sure that we want to be in the business of explicitly marking > > things as insecure other than our own RFCs, though -- there could be an > > implication of mo

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Sean Turner
On Mar 30, 2016, at 11:33, Benjamin Kaduk wrote: > > I support this plan (with the expectation that the IANA "specification > required" rules take precedence over the informal text in this mail > about a "stable, publicly available, peer reviewed reference document", > as Yoav noted as a potentia

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Sean Turner
I apologize in advance; this is about process so it’s long. On Mar 30, 2016, at 01:29, Yoav Nir wrote: > > Hi Sean > > I also strongly support this. I’m just wondering how we plan to enforce the > "stable, publicly available, peer reviewed reference” part. As your examples > below show, the

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Yoav Nir
> On 30 Mar 2016, at 7:05 PM, Daniel Kahn Gillmor > wrote: > > On Wed 2016-03-30 11:33:09 -0400, Benjamin Kaduk wrote: >> I am not sure that we want to be in the business of explicitly marking >> things as insecure other than our own RFCs, though -- there could be an >> implication of more revi

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Salz, Rich
> I think i'd rather see it stay at "approved/not-approved" There is also the concern that various parties (e.g., national crypto) can get upset by this kind of thing. Which is why I prefer "approved/no-comment" as the dividing line. ___ TLS mailin

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Daniel Kahn Gillmor
On Wed 2016-03-30 11:33:09 -0400, Benjamin Kaduk wrote: > I am not sure that we want to be in the business of explicitly marking > things as insecure other than our own RFCs, though -- there could be an > implication of more review than is actually the case, which is what this > proposal is trying

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Henrick Hellström
On 2016-03-30 17:33, Benjamin Kaduk wrote: I am not sure that we want to be in the business of explicitly marking things as insecure other than our own RFCs, though -- there could be an implication of more review than is actually the case, which is what this proposal is trying to get rid of. So

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Eric Rescorla
I am in favor of this. On Tue, Mar 29, 2016 at 6:53 PM, Sean Turner wrote: > Hi! > > In Yokohama, we discussed changing the IANA registry assignment rules for > cipher suites to allow anyone with a stable, publicly available, peer > reviewed reference document to request and get a code point and

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Benjamin Kaduk
On 03/29/2016 08:53 PM, Sean Turner wrote: > Hi! > > In Yokohama, we discussed changing the IANA registry assignment rules for > cipher suites to allow anyone with a stable, publicly available, peer > reviewed reference document to request and get a code point and to add an > “IETF Recommended”

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Henrick Hellström
On 2016-03-30 13:27, Dmitry Belyavsky wrote: Dear Sean, I support the plan in general, but I think that we need to separately indicate that a particular algorithm/ciphersuite is not just "Not recommended" but found insecure. This does indeed sound reasonable. _

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-30 Thread Dmitry Belyavsky
Dear Sean, I support the plan in general, but I think that we need to separately indicate that a particular algorithm/ciphersuite is not just "Not recommended" but found insecure. Thank you! On Wed, Mar 30, 2016 at 4:53 AM, Sean Turner wrote: > Hi! > > In Yokohama, we discussed changing the IA

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Daniel Kahn Gillmor
On Tue 2016-03-29 21:53:13 -0400, Sean Turner wrote: > 1. The IANA registry rules for the TLS cipher suite registry [1] will be > changed to specification required. > > 2. A new “IETF Recommended” column will be added with two values: “Y” or “N”. > Y and N have the following meaning: > > Cipher

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Yoav Nir
Hi Sean I also strongly support this. I’m just wondering how we plan to enforce the "stable, publicly available, peer reviewed reference” part. As your examples below show, the reference tends to be an I-D. That’s stable and publicly available, but we have no idea if it’s peer reviewed or who

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-29 Thread Salz, Rich
Strongly support this. ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls