Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Peter Gutmann
Eric Rescorla writes: >Well, I note that the text also says "or have had very little usage," When the Brainpool-with-TLS RFC was published, several implementers announced that they'd added support within 24 hours of the RFC appearing (in some cases determined by time zones). I think that was th

Re: [TLS] TLS DANE chain, detailed response to concerns raised in the room on Monday

2018-07-18 Thread Eric Rescorla
On Tue, Jul 17, 2018 at 7:30 PM, Viktor Dukhovni wrote: > > c. Testing is not a good fit at this layer, all that's >pinned is the ability to deliver the extension, after a >previous connection delivered DANE TLSA records and a >non-zero extension support

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Hubert Kario
On Wednesday, 18 July 2018 10:52:08 CEST Peter Gutmann wrote: > Eric Rescorla writes: > >Well, I note that the text also says "or have had very little usage," > > When the Brainpool-with-TLS RFC was published, several implementers > announced that they'd added support within 24 hours of the RFC a

Re: [TLS] TLS DANE chain, detailed response to concerns raised in the room on Monday

2018-07-18 Thread Shumon Huque
On Wed, Jul 18, 2018 at 4:55 AM Eric Rescorla wrote: > > To the extent to which this is true, it's an argument that one should be > pinning at a different layer. > > (I've mentioned this in private email to some of you, but for broader input, I'm throwing it out on the list too.) On the topic of

Re: [TLS] TLS DANE chain, detailed response to concerns raised in the room on Monday

2018-07-18 Thread Paul Wouters
On Wed, 18 Jul 2018, Eric Rescorla wrote: detailed response to concerns raised in the room on Monday On Tue, Jul 17, 2018 at 7:30 PM, Viktor Dukhovni wrote:         c. Testing is not a good fit at this layer, all that's            pinned is the ability to deliver the extension,

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Bruckert, Leonie
As I understand from the text, the Brainpool curves itself are not prohibited, but the code points assigned to them. So, if people still want to use the Brainpool curves in conformance with the standard, I would conclude that they can request new code points. This would result in an IANA registr

[TLS] Fwd: New Version Notification for draft-barnes-tls-pake-04.txt

2018-07-18 Thread Richard Barnes
Hey TLS WG, In response to some of the list discussion since the last IETF, Owen and I revised our TLS PAKE draft. In the current version, instead of binding to a single PAKE (SPAKE2+), it defines a general container that can carry messages for any PAKE that has the right shape. And we think tha

Re: [TLS] Proposed changes to draft-ietf-tls-subcerts

2018-07-18 Thread Patton,Christopher J
Hi Ilari, I suppose you mean that this condition violates the critical bit semantics: "If the extension is marked critical, then the server MUST NOT offer the certificate unless it offers a delegated credential as well." Your suggesting adding a "must-use-DC" flag to the extension body? The co

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Salz, Rich
> This would result in an IANA registry with duplicated entries for brainpool > curves: the old, now prohibited code points and the new assigned ones. Is > this correct? No. The request could ask for the existing reserved codepoints to be re-used. ___

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Salz, Rich
>> This would result in an IANA registry with duplicated entries for brainpool >> curves: the old, now prohibited code points and the new assigned ones. Is >> this correct? >No. The request could ask for the existing reserved codepoints to be re-used. But note that the WG decision was to r

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Blumenthal, Uri - 0553 - MITLL
> This would result in an IANA registry with duplicated entries for brainpool > curves: the old, now prohibited code points and the new assigned ones. Is > this correct? No. The request could ask for the existing reserved codepoints to be re-used. No offense meant, but this does not make

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Salz, Rich
>No offense meant, but this does not make sense. Code points were assigned, >probably some apps were/are using them. Now those code points are to be >invalidated, and new ones assigned instead?! Perhaps I am confused. Code points for pre-1.3 were assigned, and they are invalid for TLS 1.3.

Re: [TLS] Why are the brainpool curves not allowed in TLS 1.3?

2018-07-18 Thread Blumenthal, Uri - 0553 - MITLL
> On Jul 18, 2018, at 13:42, Salz, Rich wrote: > > >No offense meant, but this does not make sense. Code points were assigned, > >probably some apps were/are using them. Now those code points are to be > >invalidated, and new ones assigned instead?! > > Perhaps I am confused. Likelier that

Re: [TLS] TLS DANE chain, detailed response to concerns raised in the room on Monday

2018-07-18 Thread Benjamin Kaduk
Hi Viktor, Thanks for writing up your thoughts; a couple notes inline: On Tue, Jul 17, 2018 at 10:30:39PM -0400, Viktor Dukhovni wrote: > > Below I shall try to address a few of the concerns raised in writing. > You can read just the high-level notes above my signature, diving > into the corresp

Re: [TLS] Proposed changes to draft-ietf-tls-subcerts

2018-07-18 Thread Santosh Chokhani
I do not think you can change an extension syntax or semantic. It is three tuple: extn ID, criticality flag, and value. You can add the syntax and semantics within the extension value as to what it means. That may not help those who do not understand the extension and cannot process the val

[TLS] Update from side meeting on TLS DNSSEC

2018-07-18 Thread Joseph Salowey
A group met this afternoon to discuss the TLS DNSSEC document. I want to thank the participants as I think it was a productive meeting. Here is chairs' summary of some of the important points of the discussion from notes from the meeting. The second section outlines some behavior that we need to

Re: [TLS] Fwd: New Version Notification for draft-barnes-tls-pake-04.txt

2018-07-18 Thread Hugo Krawczyk
+1 for this work. If you are one of those that think, as I did 20 years ago, that password authentication is dying and practical replacements are just around the corner, do not support this document. Otherwise, please do. Asymmetric or augmented PAKE (aPAKE) protocols provide secure password auth

Re: [TLS] Update from side meeting on TLS DNSSEC

2018-07-18 Thread Viktor Dukhovni
On Wed, Jul 18, 2018 at 06:28:39PM -0400, Joseph Salowey wrote: > THE NON-TLSA BEHAVIOR > Consider the following TLSA record: > > - domain example.com > - record for key K1 > - TTL of 3600s > > If I retrieved this record over DNS and then connected to example.com > over TLS and it ga

Re: [TLS] TLS DANE chain, detailed response to concerns raised in the room on Monday

2018-07-18 Thread Nico Williams
On Wed, Jul 18, 2018 at 01:54:09AM -0700, Eric Rescorla wrote: > On Tue, Jul 17, 2018 at 7:30 PM, Viktor Dukhovni > wrote: > > > > c. Testing is not a good fit at this layer, all that's > >pinned is the ability to deliver the extension, after a > >previous connectio

Re: [TLS] TLS DANE chain, detailed response to concerns raised in the room on Monday

2018-07-18 Thread Nico Williams
On Wed, Jul 18, 2018 at 08:41:59AM -0400, Shumon Huque wrote: > At yesterday's WG meeting, Sam Weiler suggested that the pinning > information could be conveyed via the DNS. That way you would not need new > holes/fields in the TLS extension. Paul said it doesn't work. But Willem > Toorop and I dis