[TLS] Genart last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Meral Shirazipour via Datatracker
Reviewer: Meral Shirazipour Review result: Ready with Nits I am the assigned Gen-ART reviewer for this draft. The General Area Review Team (Gen-ART) reviews all IETF documents being processed by the IESG for the IETF Chair. Please treat these comments just like any other last call comments. For

[TLS] Iotdir last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Daniel Migault via Datatracker
Reviewer: Daniel Migault Review result: Ready with Nits Hi, I reviewed this document as part of the IoT Directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the Security Area Directors. Document authors,

Re: [TLS] Iotdir last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Daniel Migault
To address the comment below, keeping weak security is likely to weaken current and future IoT communications, so I do not think there is room for compromise with performance. Of course this is in a context of TLS. I expect protocol to leverage from TLS security, so the impact should be rather neg

[TLS] ECH test server

2020-10-27 Thread Chris Box (BT)
Hi, I would like to test an ECH-enabled client, but am struggling to find a public test server with a published ECHconfig in its HTTPS record. Do any yet exist? I've looked in all these places, but none are mentioned: https://github.com/tlswg/draft-ietf-tls-esni/wiki/Implementation-Status https:

[TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Stephen Farrell
Hiya, The latest ECH draft from Oct 16 says "ECH uses draft-05 of HPKE for public key encryption." The latest HPKE draft (-06) from Oct 23 has a few minor incompatible changes (for good but relatively trivial reasons). So for interop ECH apparently requires use of an outdated I-D, despite the

Re: [TLS] ECH test server

2020-10-27 Thread Stephen Farrell
On 27/10/2020 18:37, Chris Box (BT) wrote: Hi, I would like to test an ECH-enabled client, but am struggling to find a public test server with a published ECHconfig in its HTTPS record. Do any yet exist? I've looked in all these places, but none are mentioned: https://github.com/tlswg/draft-

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Mark Nottingham
Stephen, I don't think what you're complaining about can be attributed to GitHub. Tools are just tools, how they're used is what's relevant (i.e., this could just as easily happen over e-mail). Cheers, > On 28 Oct 2020, at 7:31 am, Stephen Farrell wrote: > > > Hiya, > > The latest ECH dra

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Stephen Farrell
Hiya, On 27/10/2020 22:28, Mark Nottingham wrote: Stephen, I don't think what you're complaining about can be attributed to GitHub. Tools are just tools, how they're used is what's relevant (i.e., this could just as easily happen over e-mail). Sorta. I doubt the volume of traffic would've ha

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Eric Rescorla
On Tue, Oct 27, 2020 at 4:00 PM Stephen Farrell wrote: > > Hiya, > > On 27/10/2020 22:28, Mark Nottingham wrote: > > Stephen, > > > > I don't think what you're complaining about can be attributed to > > GitHub. Tools are just tools, how they're used is what's relevant > > (i.e., this could just a

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Stephen Farrell
Hiya, On 27/10/2020 23:06, Eric Rescorla wrote: On Tue, Oct 27, 2020 at 4:00 PM Stephen Farrell wrote: Hiya, On 27/10/2020 22:28, Mark Nottingham wrote: Stephen, I don't think what you're complaining about can be attributed to GitHub. Tools are just tools, how they're used is what's re

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Eric Rescorla
On Tue, Oct 27, 2020 at 4:20 PM Stephen Farrell wrote: > > Hiya, > > On 27/10/2020 23:06, Eric Rescorla wrote: > > On Tue, Oct 27, 2020 at 4:00 PM Stephen Farrell > > wrote: > > > >> > >> Hiya, > >> > >> On 27/10/2020 22:28, Mark Nottingham wrote: > >>> Stephen, > >>> > >>> I don't think what yo

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Salz, Rich
>I don't think what you're complaining about can be attributed to GitHub. > Tools are just tools, how they're used is what's relevant (i.e., this could > just as easily happen over e-mail). Frictionless and increased speed can be its own drawback. ___

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Stephen Farrell
On 27/10/2020 23:27, Eric Rescorla wrote: In fact, it*is* the IETF process, or rather one permitted IETF process, since RFC 8874. I don't believe the current case matches my recollection of that, but I've not checked in detail. The lack of list discussion certainly smells wrong to me. If

Re: [TLS] [Last-Call] Iotdir last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Michael Richardson
<#secure method=pgpmime mode=sign> Daniel Migault via Datatracker wrote: > RFC6194 may be mentioned as a reference for > not deprecating HMAC-SHA-1 as well as an > additional reference to [NISTSP800-131A-R2]. > Reading the text the situation of HMAC with > MD5 is unclear. Si

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Sean Turner
Stephen, Given that there appears to be emerging consensus around the "issue discussion mode with email summaries sounds" presented in Chris' email from just last week can we let that settle? We can certainly get a summary together - granted there have been interim meetings with published minu

Re: [TLS] [Last-Call] Iotdir last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Sean Turner
> On Oct 27, 2020, at 19:44, Michael Richardson wrote: > > > <#secure method=pgpmime mode=sign> > > Daniel Migault via Datatracker wrote: >> RFC6194 may be mentioned as a reference for >> not deprecating HMAC-SHA-1 as well as an >> additional reference to [NISTSP800-131A-R2]. > >> Reading

Re: [TLS] ECH & HPKE versions as an example of too much githubbery

2020-10-27 Thread Stephen Farrell
Hiya, On 28/10/2020 00:32, Sean Turner wrote: Stephen, Given that there appears to be emerging consensus around the "issue discussion mode with email summaries sounds" presented in Chris' email from just last week can we let that settle? My bet is that yes the WG will land on that bad answer

Re: [TLS] Iotdir last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Sean Turner
Please note the comment about Section 3 suggests changing server behavior from SHOULD NOT to a MUST NOT. > On Oct 27, 2020, at 10:19, Daniel Migault via Datatracker > wrote: > > Reviewer: Daniel Migault > Review result: Ready with Nits > > Hi, > > > I reviewed this document as part of the

Re: [TLS] Iotdir last call review of draft-ietf-tls-md5-sha1-deprecate-04

2020-10-27 Thread Sean Turner
> On Oct 27, 2020, at 10:32, Daniel Migault wrote: > > To address the comment below, keeping weak security is likely to weaken > current and future IoT communications, so I do not think there is room for > compromise with performance. Of course this is in a context of TLS. I expect > protoc