Re: [TLS] Make DANE-TLS (RFC 6698) mandatory for TLS

2018-10-16 Thread Ted Lemon
Not an argument in favor of the proposal, but the issue with firewall certs is not that we would want to override local security policy, but that firewall certs *can* in principle override local security policy, and in principle DANE could be used to prevent that. What is meant by a firewall cert

Re: [TLS] Make DANE-TLS (RFC 6698) mandatory for TLS

2018-10-16 Thread Rene 'Renne' Bartsch, B.Sc. Informatics
Unjust certificates can be bought for 150,- $ in the darknet which makes TLS snake-oil. And you never know if the internet provider is hostile or hacked. So we should act in the favor of end-users. If we don't have the position to make DANE mandatory, yet, we should at least try to encourage bro

Re: [TLS] Make DANE-TLS (RFC 6698) mandatory for TLS

2018-10-16 Thread Richard Barnes
On Tue, Oct 16, 2018 at 10:02 AM Rene 'Renne' Bartsch, B.Sc. Informatics wrote: > Unjust certificates can be bought for 150,- $ [citation-needed] https://xkcd.com/285/ I'm sure if you could produce such a certificates, the root programs would be happy to investigate how it was caused to be is

Re: [TLS] Make DANE-TLS (RFC 6698) mandatory for TLS

2018-10-16 Thread Ted Lemon
Can you provide a citation for that statement? Not doubting you, particularly, but this is news to me, and probably to some others on this list, if true. On Tue, Oct 16, 2018 at 4:01 PM Rene 'Renne' Bartsch, B.Sc. Informatics wrote: > Unjust certificates can be bought for 150,- $ in the darkne

Re: [TLS] Make DANE-TLS (RFC 6698) mandatory for TLS

2018-10-16 Thread Rene 'Renne' Bartsch, B.Sc. Informatics
I haven't found the article with 150,- $, yet, but this isn't good either: https://www.bankinfosecurity.com/study-finds-custom-market-for-bogus-tls-certificates-a-10680 and Mozilla makes it worse: https://blog.mozilla.org/security/2018/10/10/delaying-further-symantec-tls-certificate-distrust/

Re: [TLS] Make DANE-TLS (RFC 6698) mandatory for TLS

2018-10-16 Thread Ryan Sleevi
On Tue, Oct 16, 2018 at 11:00 AM Rene 'Renne' Bartsch, B.Sc. Informatics wrote: > I haven't found the article with 150,- $, yet, but this isn't good either: > > > https://www.bankinfosecurity.com/study-finds-custom-market-for-bogus-tls-certificates-a-10680 > > and Mozilla makes it worse: > > > ht

Re: [TLS] HELLO_VERIFY_REQUEST during abbreviated handshake (session resumption)

2018-10-16 Thread Eric Rescorla
Hi Simon, I don't think we specified a concrete recommendation, but I think the answer is probably no. The reason is that: (a) a resumed handshake is very cheap, so it's not really saving CPU (b) the server's first flight is small in resumption, so amplification isn't much of an issue. Maybe I'm

Re: [TLS] [Errata Rejected] RFC6176 (5520)

2018-10-16 Thread Eugène Adell
@Florian The document is about the SSL 2.0 security deficiencies, particularly the ones that brought its prohibition. The solutions to these deficiencies might also have their own problems, as it's often the case in security related topics which look like a never-ending debate (a problem, a soluti

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread Daniel Kahn Gillmor
Hi all-- I'm disappointed in how long this WG is taking to get draft-ietf-tls-dnssec-chain-extension out the door. I agree with both Tom and Viktor that the current draft seems to be misaligned between the goals and the stated scope. I wanted the draft to be done by now because i think it will b

[TLS] WGLC for draft-ietf-tls-sni-encryption

2018-10-16 Thread Sean Turner
All, This is the working group last call for the "Issues and Requirements for SNI Encryption in TLS" draft available at http://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/. Please review the document and send your comments to the list by 2359 UTC on 31 October 2018. Thanks your cha

Re: [TLS] WGLC for draft-ietf-tls-sni-encryption

2018-10-16 Thread Sean Turner
All, I ran I-D nits before hitting the appropriate buttons to place this draft in WGLC. I figured we could address the following before we send the draft to Ben: == Outdated reference: draft-ietf-tls-tls13 has been published as RFC 8446 == Outdated reference: A later version (-14) e

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread Viktor Dukhovni
> On Oct 16, 2018, at 6:16 PM, Daniel Kahn Gillmor > wrote: > > Just a quick summary of my understanding: > > * The existence of a pin only requires that the service operator > maintain the ability to respond to this extension in the future -- it > doesn't require specific keys, or even

Re: [TLS] WGLC for draft-ietf-tls-sni-encryption

2018-10-16 Thread Martin Thomson
This is a pretty good piece of information that is very nearly done. Regarding the idnits results, DoH is done, but DTLS and QUIC are still a way off. Would we prefer publication with downref or waiting? For me, this depends somewhat on the maturity of the documents that depend on this. I'd be

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread John Levine
Hi from DNS land. >pinning, but i won't go too far into the weeds here. Just a quick >summary of my understanding: > > * The existence of a pin only requires that the service operator > maintain the ability to respond to this extension in the future -- it > doesn't require specific keys, or e

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread Benjamin Kaduk
On Tue, Oct 16, 2018 at 06:16:22PM -0400, Daniel Kahn Gillmor wrote: > > I agree with both Tom and Viktor that the current draft seems to be > misaligned between the goals and the stated scope. I also agree that there is some misalignment of this nature. My attempt at a root cause analysis would

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread Viktor Dukhovni
> On Oct 16, 2018, at 9:07 PM, John Levine wrote: > > Something like "require DANE certs until time N" should be plenty. > > Remember that you can also unpin by publishing a signed NXDOMAIN or > NODATA. Since you need to have DNSSEC working to get the pin in the > first place, that doesn't s

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread Paul Wouters
On Tue, 16 Oct 2018, Daniel Kahn Gillmor wrote: That said, it sounds like negotiating the details of how to do this pinning is the main blocker, and i'm sick of this proposal being blocked (because i want it for "greenfield" implementations last year). Imagine how sick I will be when I try to

Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

2018-10-16 Thread Viktor Dukhovni
On Wed, Oct 17, 2018 at 01:46:20AM -0400, Paul Wouters wrote: > On Tue, 16 Oct 2018, Daniel Kahn Gillmor wrote: > > > That said, it sounds like negotiating the details of how to do this > > pinning is the main blocker, and i'm sick of this proposal being blocked > > (because i want it for "greenf