[TLS] encrypted content type and padding

2015-09-21 Thread Daniel Kahn Gillmor
Hey TLS folks-- apologies for the delay in sending these pull requests. encrypted content type: --- https://github.com/tlswg/tls13-spec/pull/51 This should be uncontroversial, and just needed freshening against the current draft. padding: We're now proposing that

Re: [TLS] Should we require implementations to send alerts?

2015-09-21 Thread Hubert Kario
On Friday 18 September 2015 15:13:37 Bill Frantz wrote: > On 9/18/15 at 4:27 AM, hka...@redhat.com (Hubert Kario) wrote: > >except that a TLS1.3 version intolerant implementation won't > >show its ugly head until TLS1.4 gets deployed > > Is there a reason a test suite can't offer TLS 1.4, even if

Re: [TLS] Should we require implementations to send alerts?

2015-09-21 Thread Hubert Kario
On Friday 18 September 2015 13:24:33 Brian Smith wrote: > On Fri, Sep 18, 2015 at 4:36 AM, Hubert Kario wrote: > > On Friday 18 September 2015 00:58:19 Martin Rex wrote: > > > Easier troubleshooting is IMO a sufficient rationale to justify > > > existence of the alert mechanism and a "SHOULD send

Re: [TLS] Fwd: New Version Notification for draft-whyte-qsh-tls13-01.txt

2015-09-21 Thread Hubert Kario
On Monday 21 September 2015 00:20:21 Dave Garrett wrote: > On Sunday, September 20, 2015 10:59:58 pm William Whyte wrote: > > might be worth increasing the maximum extension size to 2^24-1 for > > TLS 1.3. > No, I don't think the limit can be raised. The general ClientHello > format has to stay fro

Re: [TLS] encrypted content type and padding

2015-09-21 Thread Watson Ladd
On Mon, Sep 21, 2015 at 3:19 AM, Jeffrey Walton wrote: > On Mon, Sep 21, 2015 at 3:02 AM, Daniel Kahn Gillmor > wrote: >> Hey TLS folks-- >> >> apologies for the delay in sending these pull requests. >> >> encrypted content type: >> --- >> >> https://github.com/tlswg/tls13-spe

Re: [TLS] Review of PR #209

2015-09-21 Thread Ilari Liusvaara
On Mon, Sep 21, 2015 at 07:38:45AM +0200, Karthikeyan Bhargavan wrote: > > In other words, if we do allow this change to client authentication, > to be safe, we must analyze the resulting protocol *as if* > applications will use the authentication event to attest to all data, > past and present, t

[TLS] WebEx meeting invitation: '15 Fall Interim

2015-09-21 Thread TLS Working Group
Hello, TLS Working Group invites you to join this WebEx meeting. '15 Fall Interim Monday, September 21, 2015 9:00 am | Pacific Daylight Time (San Francisco, GMT-07:00) | 8 hrs JOIN WEBEX MEETING https://ietf.webex.com/ietf/j.php?MTID=mf2ecbe12f0cf7a93601297ea89cbf5ce Meeting number: 642 1

[TLS] WebEx meeting invitation: '15 Fall Interim

2015-09-21 Thread TLS Working Group
Hello, TLS Working Group invites you to join this WebEx meeting. '15 Fall Interim Tuesday, September 22, 2015 9:00 am | Pacific Daylight Time (San Francisco, GMT-07:00) | 1 hr JOIN WEBEX MEETING https://ietf.webex.com/ietf/j.php?MTID=m3a04aa0bc197fc8e2a2c45b34ac5136b Meeting number: 648 0

[TLS] Fall Interim webex/jabber details

2015-09-21 Thread Sean Turner
Please note that I sent two webex invites one for each day and that they have different meeting #s but the same pwd: Monday: https://mailarchive.ietf.org/arch/msg/tls/2wD0hlicN7oaBbWO8qKqtXAhfos Tuesday: https://mailarchive.ietf.org/arch/msg/tls/mP16zjy9h7eH2y02WTEnTqDKey4 We’re starting at 9 P

Re: [TLS] Review of PR #209

2015-09-21 Thread Martin Thomson
On Sep 21, 2015 7:02 AM, "Ilari Liusvaara" wrote: > Under such assumption, even dynamic reauth in HTTP/1.1 is unsafe. If > one additionally assumes causality, dynamic reauth in non-pipelined > HTTP/1.1 may be safe, but dynamic reauth in HTTP/2 (or HTTP/1.1 with > pipelining) is still unsafe. What

Re: [TLS] Review of PR #209

2015-09-21 Thread Daniel Kahn Gillmor
On Sun 2015-09-20 22:38:45 -0700, Karthikeyan Bhargavan wrote: > As dkg points out, dynamically authenticating clients later in the connection > brings up > API issues of how to notify the application about the scope of this new > authentication event. > > I think it is inevitable that implemen

Re: [TLS] encrypted content type and padding

2015-09-21 Thread Daniel Kahn Gillmor
On Mon 2015-09-21 04:43:27 -0700, Watson Ladd wrote: > Is this actually true in the second pull request? No: a moment of > actually reading reveals that the string is inside an AEAD encrypted > packet. There is no way in which this padding could be modified for > use in a side-channel attack. In

Re: [TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-09-21 Thread Daniel Kahn Gillmor
On Fri 2015-08-28 09:22:52 -0700, Viktor Dukhovni wrote: > So the client would now need to cache some session data by transport > address, and other data by name and port. That's rather complex. This is already done by HTTP/2 clients, since they can access multiple servers at the same address:p

[TLS] '15 TLS WG interim materials

2015-09-21 Thread Sean Turner
I’ve uploaded the slides I’ve received to: https://www.ietf.org/proceedings/interim/2015/09/21/tls/proceedings.html spt ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] encrypted content type and padding

2015-09-21 Thread Dave Garrett
On Monday, September 21, 2015 03:02:47 am Daniel Kahn Gillmor wrote: > encrypted content type: > --- > > https://github.com/tlswg/tls13-spec/pull/51 Basing the padding PR(s) on top of this might be a good idea, seeing as it's desired to do this correctly. One thought about d

Re: [TLS] Fwd: New Version Notification for draft-whyte-qsh-tls13-01.txt

2015-09-21 Thread Hubert Kario
On Monday 21 September 2015 15:04:17 Dave Garrett wrote: > On Monday, September 21, 2015 07:22:03 am Hubert Kario wrote: > > On Monday 21 September 2015 00:20:21 Dave Garrett wrote: > > > A strong reason is it not being possible to change due to the need > > > for TLS 1.3 clients to be able to conn

Re: [TLS] Review of PR #209

2015-09-21 Thread Geoffrey Keating
Daniel Kahn Gillmor writes: > Consider a server has an ongoing session wrapped in TLS that uses client > authentication to approve or deny some requests from the client. It > remembers what requests the client has made as some sort of relevant > state. Let's take an imap server working with a c