[TLS]Re: TLS trust expressions and certificate_authorities

2024-06-12 Thread Dennis Jackson
On 12/06/2024 02:36, Nick Harper wrote: If Trust Expressions does meaningfully change the calculus compared to certificate_authorities, it does it in a way that lessens risk. The certificate_authorities extension doesn't scale support the legitimate use case of trust negotiation/advertisement

[TLS]Re: Curve-popularity data?

2024-06-12 Thread Hubert Kario
On Wednesday, 12 June 2024 02:02:41 CEST, D. J. Bernstein wrote: There will be an annoyingly large number of options on the PQ side---for example, for different security levels and for patent avoidance---and I'd expect a tricky discussion of which options to recommend for TLS. I'm not sure I buy

[TLS]Working Group Last Call for Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings

2024-06-12 Thread Sean Turner
This email starts the working group last call for "Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings” I-D, located here: https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/ The WG Last Call will end 26 June 2024 @ 2359 UTC. Please review the I-D and submit issues and pull

[TLS]Re: Consensus Call: -rfc8446bis PRs #1343 & #1345

2024-06-12 Thread Kyle Nekritz
Yes, my worry is really around enforcement of a property that can’t be strictly adhered to. How about something along the lines of: Until receiving a KeyUpdate from the peer, the sender MUST NOT send another KeyUpdate with request_update set to "update_requested". Note that implement

[TLS]Re: Consensus Call: -rfc8446bis PRs #1343 & #1345

2024-06-12 Thread David Benjamin
Works for me! Updated the PR with your suggestion (plus one extra word to be clear it's a subsequent KeyUpdate and not a random past one). On Wed, Jun 12, 2024 at 3:56 PM Kyle Nekritz wrote: > Yes, my worry is really around enforcement of a property that can’t be > strictly adhered to. How about

[TLS]Re: Consensus Call: -rfc8446bis PRs #1343 & #1345

2024-06-12 Thread Sean Turner
Hi! Just reminder to get any concerns about merging these in by 17 June 2024. spt > On Jun 3, 2024, at 11:38, Sean Turner wrote: > > Since draft-ietf-tls-rfc8446bis last completed WGLC, two PRs have been > submitted (and discussed) that include changes to normative language: > > - #1343: Forb

[TLS]Re: TLS trust expressions and certificate_authorities

2024-06-12 Thread Nick Harper
On Wed, Jun 12, 2024 at 3:17 AM Dennis Jackson wrote: > You can't argue that T.E. contains the functionality of > certificate_authorities as a subset, then conclude that having additional > functionalities makes it less risky. You would need to argue the exact > opposite, that T.E. doesn't contai

[TLS]Re: Working Group Last Call for Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings

2024-06-12 Thread Raghu Saxena
I had one comment earlier that seems to have been missed [0]. Basically I was wondering if it may be useful to use stronger language in the draft to indicate a client MUST use Port Prefix Naming when looking up the SVCB record. Regards, Raghu Saxena [0] https://mailarchive.ietf.org/arch/msg