Re: [TLS] Privacy considerations - identity hiding from eavesdropping in (D)TLS

2015-08-28 Thread Viktor S. Wold Eide
On Thu, Aug 27, 2015 at 1:18 PM, Eric Rescorla wrote: > > > On Thu, Aug 27, 2015 at 2:14 AM, Viktor S. Wold Eide < > viktor.s.wold.e...@gmail.com> wrote: > >> On Mon, Aug 24, 2015 at 11:17 PM, Eric Rescorla wrote: >> >>> >>> >>> TLS 1.3 encrypts both the client's and server's certificates alread

Re: [TLS] Privacy considerations - identity hiding from eavesdropping in (D)TLS

2015-08-28 Thread Viktor Dukhovni
On Fri, Aug 28, 2015 at 04:27:28PM +0200, Viktor S. Wold Eide wrote: > > I don't think this matches most TLS use cases very well, since the client > > generally isn't authenticated at all, so there's no point in the server > > progressively > > revealing more. > > > > > Although the client general

Re: [TLS] [tls13-spec] expand MTI Extensions and add more strict requirements (#232)

2015-08-28 Thread Salz, Rich
Having discussions through github is a really bad idea. Mail formatting can get even more mangled, and we lose the IETF mail archive and participation. I think we need to be more diligent and avoid doing that. > There's just no statement of what to do when it's required and not given. That's

[TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-08-28 Thread Dave Garrett
On Friday, August 28, 2015 11:08:35 am Salz, Rich wrote: > Having discussions through github is a really bad idea. You're right. I posted a stupidly long side-note in there. I intended to bring it to the list too, which I'll do now. On Friday, August 28, 2015 10:49:33 am Viktor Dukhovni wrote: >

Re: [TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-08-28 Thread Viktor Dukhovni
On Fri, Aug 28, 2015 at 12:13:03PM -0400, Dave Garrett wrote: > The idea I had the other day is that we can technically do SNI encryption > with the current TLS 1.3 draft, as-is. All that needs to really be done > is stick it in a 0-RTT EncryptedExtensions, preferably only when the server > specif

Re: [TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-08-28 Thread Salz, Rich
> > The idea I had the other day is that we can technically do SNI > > encryption with the current TLS 1.3 draft, as-is. Yeah, some of us talked about this in Dallas, etc., when the "semi-static EDH key" really started to take hold. I showed slides at the interim before IETF 90 in Toronto, that

Re: [TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-08-28 Thread Dave Garrett
On Friday, August 28, 2015 12:33:31 pm Salz, Rich wrote: > > And how often will the same client visit multiple servers at the same > > transport address? > > Anyone who visits sites hosted by a CDN. And, I suspect, many large portals. How's it done with IPv6, generally? Are there setups where ev

Re: [TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-08-28 Thread Salz, Rich
> How's it done with IPv6, generally? We don't see address-sharing with IPv6, although I wonder if that will change when the routing tables get too big. :) We also don't see anyone willing to go IPv6-only; it's not close to universal enough yet. > I agree that it's a lot of effort for relative

[TLS] I-D Action: draft-ietf-tls-tls13-08.txt

2015-08-28 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Transport Layer Security Working Group of the IETF. Title : The Transport Layer Security (TLS) Protocol Version 1.3 Author : Eric Rescorla

[TLS] draft-ietf-tls-tls13-08 and plan for future drafts

2015-08-28 Thread Eric Rescorla
Folks, I've just posted draft-08 which includes the changes discussed on-list to require digital signatures from the client even if you are re-using a previous configuration in 0-RTT (per WG discussion). This version also includes a bunch of other cleanup, as detailed below: - Remove support for

[TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Eric Rescorla
https://github.com/tlswg/tls13-spec/issues/233 Folks, We presently have some support for DH_anon cipher suites. I agree that this is a useful use case, but it's yet another mode. I would like to suggest that we instead deprecate it and instead always use Raw Public Key mode (https://tools.ietf.o

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Dave Garrett
I actually had this in my old a la carte proposal. Here's the relevant section posted separately, unedited, except for keeping the current list of RFCs with anon that weren't in that proposal: https://github.com/tlswg/tls13-spec/compare/master...davegarrett:unauthenticated Dave __

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Martin Thomson
This seems fine to me, though I'll note that 7250 only really saves you space when it comes down to it. You can wrap your raw public key in a certificate, just like we do in WebRTC, and then you don't need 7250 support in your library. Noting you can only do any of these variations in a context w

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Eric Rescorla
On Fri, Aug 28, 2015 at 11:07 AM, Martin Thomson wrote: > This seems fine to me, though I'll note that 7250 only really saves > you space when it comes down to it. You can wrap your raw public key > in a certificate, just like we do in WebRTC, and then you don't need > 7250 support in your libra

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Viktor Dukhovni
On Fri, Aug 28, 2015 at 11:07:02AM -0700, Martin Thomson wrote: > This seems fine to me, though I'll note that 7250 only really saves > you space when it comes down to it. You can wrap your raw public key > in a certificate, just like we do in WebRTC, and then you don't need > 7250 support in you

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Eric Rescorla
On Fri, Aug 28, 2015 at 11:33 AM, Viktor Dukhovni wrote: > On Fri, Aug 28, 2015 at 11:07:02AM -0700, Martin Thomson wrote: > > > This seems fine to me, though I'll note that 7250 only really saves > > you space when it comes down to it. You can wrap your raw public key > > in a certificate, just

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Martin Thomson
On 28 August 2015 at 11:36, Eric Rescorla wrote: > How does anon-DH have different privacy properties than doing > RFC 7250 with a fresh signing key for each connection? Or what we do in WebRTC, which uses a certificate that has no good information in it?

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Martin Thomson
On 28 August 2015 at 11:33, Viktor Dukhovni wrote: > On the other hand, it allows servers to detect that a > client is not planning to authenticate the server, which has forensic > value, and can be used to grant appropriately restricted access. I think that these are potentially useful properti

[TLS] DSA support in TLS 1.3.

2015-08-28 Thread Dang, Quynh
Hi all, DSA is supported in the previous versions of TLS. It would be nice if someone who uses DSA can use it in TLS 1.3 as well. People who don't use DSA, then they don't use DSA. People who use DSA right, it should be fine for them to use DSA. I don't see a convincing reason to remove sup

Re: [TLS] Deprecate DH_anon in favor of raw public keys?

2015-08-28 Thread Ronald del Rosario
"Or what we do in WebRTC, which uses a certificate that has no good information in it?” +1. Anxiously waiting for response on this, as I am currently helping non-profit groups build a private and secure P2P Messaging System using WebRTC, which of course utilizes encrypted P2P connection between

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Ilari Liusvaara
On Fri, Aug 28, 2015 at 07:17:39PM +, Dang, Quynh wrote: > Hi all, > > DSA is supported in the previous versions of TLS. It would be nice > if someone who uses DSA can use it in TLS 1.3 as well. Well, at least for the web, DSA is no longer an option because major browsers have dropped support

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Sean Turner
Quynh, You must have been reading my mind because I’m working on something that will help Joe and I judge consensus on what to do about DSA. Let’s hold off on this thread for a bit while I get that msg together. spt On Aug 28, 2015, at 15:17, Dang, Quynh wrote: > Hi all, > > DSA is support

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Hanno Böck
On Fri, 28 Aug 2015 19:17:39 + "Dang, Quynh" wrote: > DSA is supported in the previous versions of TLS. It would be nice if > someone who uses DSA can use it in TLS 1.3 as well. Do you have a plausible reason why you want to use DSA? Or is this purely a theoretical consideration? Because thi

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Tony Arcieri
On Friday, August 28, 2015, Dang, Quynh wrote: > > People who don't use DSA, then they don't use DSA. People who use DSA > right, it should be fine for them to use DSA. > Can you name one of these people? If not, you seem to be arguing for including legacy protocols with no real-world use case in

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Viktor Dukhovni
On Fri, Aug 28, 2015 at 01:27:57PM -0700, Tony Arcieri wrote: > On Friday, August 28, 2015, Dang, Quynh wrote: > > > > People who don't use DSA, then they don't use DSA. People who use DSA > > right, it should be fine for them to use DSA. > > > Can you name one of these people? If not, you seem t

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Dave Garrett
On Friday, August 28, 2015 04:21:53 pm Hanno Böck wrote: > On Fri, 28 Aug 2015 19:17:39 + > "Dang, Quynh" wrote: > > I don't see a convincing reason to remove support of DSA in TLS 1.3. > > The reason is avoiding feature bloat. I think it makes a lot of sense > to question the support of feat

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Tony Arcieri
On Fri, Aug 28, 2015 at 1:59 PM, Dave Garrett wrote: > I'd rather just declare it obsolete and no longer permitted to avoid the > attack surface and complexity, and I get an impression that this is a > common opinion in the WG. +1. Most people seem to oppose its inclusion, and the people asking

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Jacob Appelbaum
On 8/28/15, Dang, Quynh wrote: > Hi all, > > > DSA is supported in the previous versions of TLS. It would be nice if > someone who uses DSA can use it in TLS 1.3 as well. > > > People who don't use DSA, then they don't use DSA. People who use DSA right, > it should be fine for them to use DSA. > >

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Dave Garrett
On Friday, August 28, 2015 08:41:23 pm Jacob Appelbaum wrote: > What do you suggest for the construction of the k value in DSA? https://tools.ietf.org/html/rfc6979#section-3.2 ? Also, we still have ECDSA, so the 'k' issue isn't going away. Should we cite this RFC? Dave ___

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Jeffrey Walton
> > Also, if DSA was to be supported, one would need to specify how to > determine the hash function (use of fixed SHA-1 doesn't fly). And > 1024-bit prime is too small. > FIPS186-4 (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf) partially remediates the issue. DSA now includes 2048 and

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Geoffrey Keating
Jeffrey Walton writes: > > > > Also, if DSA was to be supported, one would need to specify how to > > determine the hash function (use of fixed SHA-1 doesn't fly). And > > 1024-bit prime is too small. > > > FIPS186-4 (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf) > partially remediat

Re: [TLS] DSA support in TLS 1.3.

2015-08-28 Thread Ronald del Rosario
> "ECDSA can be smaller, faster, and more secure all at once; and if you don't > like ECDSA or want an alternative, there's RSA." > Isn't that a step backward reverting to RSA? Ron F. Del Rosario CONFIDENTIALITY NOTICE: This e-mail and any files attached may con