Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread Eliot Lear
Hi Ben Thanks for the response. Please see below. > > Agreed ... but this proposal appears to be predicated on a contrary > assumption. It assumes that it is difficult for malware to learn the TLS > profile of the device, and then proceeds to place this profile information in > the (public)

Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread tirumal reddy
Thanks Ben and Eliot for the feedback. Please see inline On Tue, 15 Sep 2020 at 14:51, Eliot Lear wrote: > Hi Ben > > Thanks for the response. Please see below. > > > > > Agreed ... but this proposal appears to be predicated on a contrary > assumption. It assumes that it is difficult for malwa

Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread Eliot Lear
> My concern is not with "new extensions" per se. The hidden assumption here > is that "extensions" are the only way TLS can evolve. In fact, future TLS > versions are not constrained to evolve in any particular way. For example, > future versions can introduce entirely new messages in the

Re: [TLS] AD review of draft-ietf-tls-dtls-connection-id-07

2020-09-15 Thread Benjamin Kaduk
Hi Achim, On Fri, Sep 04, 2020 at 08:58:51AM +0200, Achim Kraus wrote: > Hi Ben, > > see my comments inline. > > Generally you may read the closed issues or PRs with the proper keywords > in https://github.com/tlswg/dtls-conn-id. > > FMPOV most stuff has been discussed over and over. For me, in

Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread Watson Ladd
On Tue, Sep 15, 2020, 9:10 AM Eliot Lear wrote: > > > > My concern is not with "new extensions" per se. The hidden assumption here > is that "extensions" are the only way TLS can evolve. In fact, future TLS > versions are not constrained to evolve in any particular way. For example, > future

Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread Nick Harper
I agree with EKR, Ben Schwartz, and Watson Ladd's concerns on this draft. The grease_extension parameter shouldn't exist, and there should be no special handling for GREASE values. GREASE doesn't need to be mentioned in this draft, except to say that a client may send values (cipher suites, extens

Re: [TLS] Static DH timing attack

2020-09-15 Thread Lanlan Pan
Dan Brown 于2020年9月10日周四 下午11:18写道: > *From:* TLS *On Behalf Of *Salz, Rich > > Do we need a short RFC saying “do not use static DH” ? > > > > Don’t TLS 0-RTT and ESNI/ECH via HPKE use a type of (semi)static ECDH? If > so, then an RFC to ban static (EC)DH in TLS would need to be very clear > abou

Re: [TLS] AD review of draft-ietf-tls-dtls-connection-id-07

2020-09-15 Thread Achim Kraus
Hi Ben, For receiving, if the tls12_cid content type is set, then the CID is used to look up the connection and the security association. If the tls12_cid content type is not set, then the connection and security association is looked up by the 5-tuple and a check MUST be m

Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread tirumal reddy
On Tue, 15 Sep 2020 at 18:39, Eliot Lear wrote: > > > My concern is not with "new extensions" per se. The hidden assumption > here is that "extensions" are the only way TLS can evolve. In fact, future > TLS versions are not constrained to evolve in any particular way. For > example, future ver