[TLS] Interim meeting information

2018-09-12 Thread Christopher Wood
Below is an agenda for Friday's virtual interim meeting, followed by the meeting information. This information is also available online [1]. We are looking for volunteers to lead each agenda item. Please respond on list or to the chairs directly if you're willing to do so. Best, Chris, Joe, and Se

Re: [TLS] Interim meeting information

2018-09-12 Thread Viktor Dukhovni
> On Sep 12, 2018, at 10:58 AM, Christopher Wood > wrote: > > Below is an agenda for Friday's virtual interim meeting, followed by > the meeting information. This information is also available online > [1]. We are looking for volunteers to lead each agenda item. Please > respond on list or to

[TLS] Another ClientHello length intolerance bug?

2018-09-12 Thread David A. Cooper
According to RFC 7685 there was at least one TLS implementation that would hang the connection if it received a ClientHello record with a TLSCiphertext.length between 256 and 511 bytes. During some recent testing I believe that I have come across a similar length int

Re: [TLS] Another ClientHello length intolerance bug?

2018-09-12 Thread David Benjamin
Wow! That's a bizarre one. I don't think we've run into this one before, but, from your description, any given implementation would only have a 1/256 chance of hitting it on every ClientHello change. 10 is a newline, so perhaps some implementation is doing a terrible job detecting TLS vs. some pla

Re: [TLS] Another ClientHello length intolerance bug?

2018-09-12 Thread David A. Cooper
It would be unlikely to hit this bug in practice. I just tried a test with Chromium 65. In the default configuration, with a 9-byte server name, the TLSCiphertext.length was 192 bytes. So, in order to hit the bug it would seem that the server's DNS name would have

[TLS] I-D Action: draft-ietf-tls-esni-00.txt

2018-09-12 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Transport Layer Security WG of the IETF. Title : Encrypted Server Name Indication for TLS 1.3 Authors : Eric Rescorla Kazuh

[TLS] TLS interim meeting material

2018-09-12 Thread Paul Wouters
Hi, We have made available what we believe is a good starting point for further discussion regarding tls-dnssec-chain draft. While I thought we had reached some additional consensus in a side meeting at IETF 102 that every use case was per definition restrictive, and that thus downgrade protec

Re: [TLS] TLS interim meeting material

2018-09-12 Thread Richard Barnes
I may have a conflict with the call, so I've gone ahead and put some opinion inline below... On Wed, Sep 12, 2018 at 5:40 PM Paul Wouters wrote: > > Hi, > > We have made available what we believe is a good starting point for > further discussion regarding tls-dnssec-chain draft. > > While I thou

Re: [TLS] TLS interim meeting material

2018-09-12 Thread Paul Wouters
On Wed, 12 Sep 2018, Richard Barnes wrote: Speaking as one of the attendees, I do not agree with that conclusion. What came to light in that meeting is that the assertive cases of DANE require that the certificate That is not what came to light. What came to light was that the assertive use

Re: [TLS] TLS interim meeting material

2018-09-12 Thread Richard Barnes
Your responses here reveal a lot of the assumptions that you're reading in here that are not actually true, e.g., those noted below. On Wed, Sep 12, 2018 at 8:56 PM Paul Wouters wrote: > On Wed, 12 Sep 2018, Richard Barnes wrote: > > > Speaking as one of the attendees, I do not agree with that c

Re: [TLS] TLS interim meeting material

2018-09-12 Thread Paul Wouters
On Wed, 12 Sep 2018, Richard Barnes wrote: DNS records have caching semantics.  Those are only relevant for DNS resolution.  This is the TLS WG, not the DNS. You are resolving a TLSA record via a TLS transport. A zone owner sent a TLSA record in a TLS handshake.  This document says nothing