Re: [TLS] Downgrade protection, fallbacks, and server time

2016-06-06 Thread Stefan Winter
Hi, > > > > I agree with Hubert. The big question is how you get the bug report to > the server operator. Automated mail to webmaster@domain_of_requested_hostname? Maybe a few thousand new mails in the operator's inbox of sorts "we have encountered a situation where your version intolerance brok

Re: [TLS] PR #493: Multiple concurrent tickets

2016-06-06 Thread Antoine Delignat-Lavaud
Hi, Le 2016-06-04 16:51, Eric Rescorla a écrit : I wanted to call out to cryptographers/analysts that this formalizes the existing practice (going back to RFC 5077) of having multiple ticket values tied to the same basic secret (though less so with 1.3 because tickets issued on connection N+1 do

Re: [TLS] no fallbacks please [was: Downgrade protection, fallbacks, and server time]

2016-06-06 Thread Hubert Kario
On Friday 03 June 2016 16:16:13 Dave Garrett wrote: > The idea of using an empty extension as an indicator really isn't > fundamentally different from what I'm suggesting here. We'd just have > an arbitrary set of new version indicators mixed in with extensions > instead of inside a new generalized

[TLS] Adoption of TLS-LTS

2016-06-06 Thread Peter Gutmann
TLS-LTS, https://tools.ietf.org/html/draft-gutmann-tls-lts-03, has more or less stabilised, incorporating all the feedback I've had for it (there's only one open question still remaining), so I'd like to request that it now be adopted as a WG item. I'd also like to request an early/temporary assig

Re: [TLS] PR #493: Multiple concurrent tickets

2016-06-06 Thread Felix Günther
Hi, On 06/06/2016 11:53 +0200, Antoine Delignat-lavaud wrote: > Le 2016-06-04 16:51, Eric Rescorla a écrit : >> I wanted to call out to cryptographers/analysts that this formalizes >> the existing practice (going back to RFC 5077) of having multiple >> ticket values tied to the same basic secret (

Re: [TLS] Downgrade protection, fallbacks, and server time

2016-06-06 Thread Martin Rex
The IMO most reasonable way forward would be to side-step the TLS version negotiation through ClientHello.client_version entirely, because of the well-known interop problems. Simply use the presence of *ANY* TLSv1.2+ TLS cipher suite in the offered list of TLS cipher suites as an indication that a

[TLS] Fwd: I-D Action: draft-lemon-tls-blocking-alert-00.txt

2016-06-06 Thread Ted Lemon
I've posted a new document to the datatracker that adds some TLS alert codes that can be sent to indicate that a particular TLS request has been blocked by the network. This attempts to address the problem of notifying the user of what went wrong when a site is blocked, without creating a channel

Re: [TLS] no fallbacks please [was: Downgrade protection, fallbacks, and server time]

2016-06-06 Thread Dave Garrett
On Monday, June 06, 2016 06:48:20 am Hubert Kario wrote: > What makes you think that a new version negotiation that works more or > less in the same way will _not_ be implemented incorrectly? The list-based extension doesn't work in quite the same way. The current mechanism compares two values a

Re: [TLS] no fallbacks please [was: Downgrade protection, fallbacks, and server time]

2016-06-06 Thread Jeffrey Walton
>> That being said, I would prefer the solution to be a compliance test suite >> that checks if servers do handle correctly future versions, future >> extensions and future ciphersuites correctly. > > I agree with Hubert. The big question is how you get the bug report to the > server operator. > >

Re: [TLS] [FORGED] Re: no fallbacks please [was: Downgrade protection, fallbacks, and server time]

2016-06-06 Thread Peter Gutmann
Dave Garrett writes: >Also, as with any new system, we now have the ability to loudly stress to TLS >1.3+ implementers to not screw it up and test for future-proofing this time >around. I think that's the main contribution of a new mechanism, it doesn't really matter whether it's communicated a