Re: [TLS] Closing on PSS. PR#1114

2017-12-11 Thread Nikos Mavrogiannopoulos
On Tue, 2017-12-05 at 12:00 +0100, Nikos Mavrogiannopoulos wrote: > On Mon, 2017-12-04 at 17:24 -0800, Eric Rescorla wrote: > > Hi folks, > > > > I've put together a PR that attemps to address the PSS issue. > > > > See: > > https://github.com/tlswg/tls13-spec/pull/1114 As I guess, we cannot man

Re: [TLS] I-D Action: draft-ietf-tls-certificate-compression-01.txt

2017-12-11 Thread Martin Thomson
On Mon, Dec 11, 2017 at 12:09 AM, Ilari Liusvaara wrote: > Transforming messages before putting them in transcript? That sounds > like recipe for some very nasty implementation headaches. > > AFAIK, nothing else in TLS does this. TLS 1.3 has reset hash and inject > synthetic message, but that is a

Re: [TLS] Closing on PSS. PR#1114

2017-12-11 Thread Ilari Liusvaara
On Mon, Dec 11, 2017 at 08:59:44AM +0100, Nikos Mavrogiannopoulos wrote: > On Tue, 2017-12-05 at 12:00 +0100, Nikos Mavrogiannopoulos wrote: > > On Mon, 2017-12-04 at 17:24 -0800, Eric Rescorla wrote: > > > Hi folks, > > > > > > I've put together a PR that attemps to address the PSS issue. > > >

Re: [TLS] I-D Action: draft-ietf-tls-certificate-compression-01.txt

2017-12-11 Thread Ilari Liusvaara
On Mon, Dec 11, 2017 at 08:50:17AM -0600, Martin Thomson wrote: > On Mon, Dec 11, 2017 at 12:09 AM, Ilari Liusvaara > wrote: > > Transforming messages before putting them in transcript? That sounds > > like recipe for some very nasty implementation headaches. > > > > AFAIK, nothing else in TLS doe

Re: [TLS] I-D Action: draft-ietf-tls-certificate-compression-01.txt

2017-12-11 Thread Martin Thomson
On Mon, Dec 11, 2017 at 9:00 AM, Ilari Liusvaara wrote: > I searched the drafts (both -00 and -01). I find absolutely nothing > to suggest this extension would play any games with the handshake > hash. And considering that extension playing such games is AFAIK > unprecidented, that would warrant r

Re: [TLS] I-D Action: draft-ietf-tls-certificate-compression-01.txt

2017-12-11 Thread Bill Frantz
The discussion of this draft makes it sound like implementations will have additional complexity to support certificate compression. Complexity adds security risks, so just how much benefit does certificate compression provide? My naive thinking is that most of the data in certificates is signa

Re: [TLS] draft-ietf-tls-exported-authenticator

2017-12-11 Thread Nick Sullivan
Ben, Putting the authenticator in an encrypted tunnel is not necessary for binding, but it is necessary for keeping the certificate itself confidential. I'll add text to that effect. Nick On Wed, Nov 15, 2017 at 7:13 PM Benjamin Kaduk wrote: > In the exported authenticators draft we claim that

Re: [TLS] I-D Action: draft-ietf-tls-certificate-compression-01.txt

2017-12-11 Thread Martin Thomson
Certificates are pretty wasteful, outside of the keys themselves. There has to be some significant gains to be had. I think that we have discussed generating a dictionary that would be useful for certificates, so if we do that we won't know the full answer yet (I see no mention of that in the draf