Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread Nikos Mavrogiannopoulos
On Wed, 2015-11-11 at 18:39 +, Mike Bishop wrote: > I know that BoringSSL explicitly requires that application data flow > be stopped during renegotiation.  If the HTTP working group adopts > this draft, do the owners of other TLS implementations expect this to > require changes in their TLS 1

Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread Matt Caswell
On 12/11/15 08:23, Nikos Mavrogiannopoulos wrote: > On Wed, 2015-11-11 at 18:39 +, Mike Bishop wrote: > >> I know that BoringSSL explicitly requires that application data flow >> be stopped during renegotiation. If the HTTP working group adopts >> this draft, do the owners of other TLS imple

Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread Hubert Kario
On Wednesday 11 November 2015 18:39:51 Mike Bishop wrote: > Per the TLS 1.2 spec, that's permitted, but if > it's not been done before, I'm afraid we may be hitting less-tested > code paths. It's also something that Java does and what NSS supports. But indeed it is problematic: https://rt.openssl

Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread Martin Rex
Matt Caswell wrote: > > > On 12/11/15 08:23, Nikos Mavrogiannopoulos wrote: > > On Wed, 2015-11-11 at 18:39 +, Mike Bishop wrote: > > > >> I know that BoringSSL explicitly requires that application data flow > >> be stopped during renegotiation. If the HTTP working group adopts > >> this dra

Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread Nikos Mavrogiannopoulos
On Wed, 2015-11-11 at 18:39 +, Mike Bishop wrote: > A question for TLS implementation owners:  During the discussion of > the TLS 1.2 portion of https://tools.ietf.org/html/draft-thomson-http > 2-client-certs-00, it was pointed out that HTTP/2 breaks a > simplification of the HTTP-TLS interface

[TLS] Review of https://tools.ietf.org/html/draft-ietf-tls-chacha20-poly1305-00

2015-11-12 Thread Martin Thomson
This is good. I have an editorial comment: can someone please go through and reconcile all the use of bits and bytes throughout. It actually seems like someone did a coin flip on every occurrence to decide which one to use. ___ TLS mailing list TLS@iet

Re: [TLS] Review of https://tools.ietf.org/html/draft-ietf-tls-chacha20-poly1305-00

2015-11-12 Thread Adam Langley
On Thu, Nov 12, 2015 at 10:06 AM, Martin Thomson wrote: > This is good. > > I have an editorial comment: can someone please go through and > reconcile all the use of bits and bytes throughout. It actually seems > like someone did a coin flip on every occurrence to decide which one > to use. -01

Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread David Benjamin
On Wed, Nov 11, 2015 at 10:43 PM Yoav Nir wrote: > > > On 12 Nov 2015, at 3:32 AM, Adam Langley wrote: > > > > The TLS 1.3 post-handshake client-auth was intended, as I recall, to > > support HTTP/1.1 over TLS 1.3. > > No, it was (and is) presented as a way to do client certificate > authenticat

Re: [TLS] SHA-1 patch updated with Russ' suggestion

2015-11-12 Thread Martin Thomson
On 5 November 2015 at 15:53, Dave Garrett wrote: > "Trusted self-signatures SHOULD be validated before adding to a trust store > and SHOULD NOT be re-checked at runtime." But we're getting slightly out of > scope here, which is why I'm thinking that elaborating on this topic exactly > as sugges

Re: [TLS] Application data during renegotiation handshake

2015-11-12 Thread Mike Bishop
Doing it at the HTTP layer (as an authentication mechanism) is challenging, since applications aren’t expecting to receive it that way, and moves the authenticated exchange onto a different stream than triggered it. I know that there’s the possibility for a layer to fake the client going away w