[TLS] FATT process update

2024-11-05 Thread Joseph Salowey
There is an updated FATT available here: https://github.com/tlswg/tls-fatt This has taken a lot of the feedback we have received so far, but is still a work in progress. There will be a little time to discuss in the meeting Friday. Joe ___ TLS mailing l

[TLS] Re: DTLS 1.3 ACK sorting, and when to clear the ACK buffer

2024-11-05 Thread Ilari Liusvaara
On Tue, Nov 05, 2024 at 11:47:44AM +, David Benjamin wrote: > On Mon, Nov 4, 2024 at 5:19 PM Ilari Liusvaara > wrote: > > > > > If the blocking flight has response, then explicit ACK is required to > > avoid deadlock (to get out of state where both sides have flight in > > progress). But this

[TLS] Re: DTLS 1.3 ACK sorting, and when to clear the ACK buffer

2024-11-05 Thread David Benjamin
On Mon, Nov 4, 2024 at 5:19 PM Ilari Liusvaara wrote: > > > There is subtle edge case where this can cause outright failures: > > > > > > - Sender that implements only linear tracking. > > > - Very large flight that gets split into lots of records. > > > - Some of those records get evicted from A

[TLS] Re: DTLS 1.3 ACK sorting, and when to clear the ACK buffer

2024-11-05 Thread David Benjamin
On Tue, Nov 5, 2024 at 2:25 PM Ilari Liusvaara wrote: > On Tue, Nov 05, 2024 at 11:47:44AM +, David Benjamin wrote: > > On Mon, Nov 4, 2024 at 5:19 PM Ilari Liusvaara > > > wrote: > > > > > > > > If the blocking flight has response, then explicit ACK is required to > > > avoid deadlock (to g

[TLS] Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Sean Turner
REQUEST: Let’s not rehash all the context. It is provided for those who might not remember or those that were not around for the duration. CONTEXT: Way back in 2016 after the WG had embarked on developing TLS 1.3, Peter Gutmann suggested that another way to “fix” TLS was to specify a version o

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Sean Turner
> On Nov 5, 2024, at 16:25, Sean Turner wrote: > > REQUEST: Let’s not rehash all the context. It is provided for those who > might not remember or those that were not around for the duration. > > CONTEXT: Way back in 2016 after the WG had embarked on developing TLS 1.3, > Peter Gutmann sugg

[TLS] Fwd: New Version Notification for draft-connolly-tls-mlkem-key-agreement-04.txt

2024-11-05 Thread Deirdre Connolly
I've updated draft-connolly-tls-mlkem-key-agreement to include the updated IANA codepoints (they were initially allocated in the reserved FFDH section) https://datatracker.ietf.org/doc/draft-connolly-tls-mlkem-key-agreement/ -- Forwarded message - From: Date: Tue, Nov 5, 2024 at

[TLS] The TLS WG has placed draft-gutmann-tls-lts in state "Call For Adoption By WG Issued"

2024-11-05 Thread IETF Secretariat
The TLS WG has placed draft-gutmann-tls-lts in state Call For Adoption By WG Issued (entered by Sean Turner) The document is available at https://datatracker.ietf.org/doc/draft-gutmann-tls-lts/ ___ TLS mailing list -- tls@ietf.org To unsubscribe send

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Nick Harper
I understand the stated goal of this draft to be to provide a way for hard-to-update endpoints to keep using TLS 1.2 in a secure way. The idea of a document that describes how to safely deploy TLS 1.2 sounds like a good idea, e.g. "use only these cipher suites, require EMS and RI, etc". This draft

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Watson Ladd
I'm against adoption. TLS 1.3 has widely been implemented and depoloyed across embedded devices and has much better analysis. You'd still need to patch devices for this to be deployable. ___ TLS mailing list -- tls@ietf.org To unsubscribe send an email t

[TLS] Re: FATT process update

2024-11-05 Thread Rob Sayre
I think Rich should retitle his document to "A 'permanent' Design Team for TLS", but then we can get on with it. The title is confusing because the first sentence is: "This memo defines a permanent design team, as defined in [WGPROCS]," That's a nit, but I think we want to be clear no process is

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Rob Sayre
On Tue, Nov 5, 2024 at 8:25 AM Sean Turner wrote: > REQUEST: Let’s not rehash all the context. It is provided for those who > might not remember or those that were not around for the duration. > > CONTEXT: Way back in 2016 after the WG had embarked on developing TLS 1.3, > Peter Gutmann suggeste

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Alicja Kario
I do not support adoption. On Tuesday, 5 November 2024 17:25:16 CET, Sean Turner wrote: REQUEST: Let’s not rehash all the context. It is provided for those who might not remember or those that were not around for the duration. CONTEXT: Way back in 2016 after the WG had embarked on developin

[TLS] Re: DTLS 1.3 ACK sorting, and when to clear the ACK buffer

2024-11-05 Thread Ilari Liusvaara
On Tue, Nov 05, 2024 at 03:24:16PM +, David Benjamin wrote: > On Tue, Nov 5, 2024 at 2:25 PM Ilari Liusvaara > wrote: > > > There is WG draft for Extended Key Update. That can be initiated from > > either side, needs at least three flights (and the current version has > > four flights) and pr

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Salz, Rich
I strongly support adoption. I do not understand why anyone would be opposed to the IETF making deployment recommendations. I can understand why someone might be bothered by the impliciation that *THIS ONE WAY* is the only way to get long-term support, especially if it's seen to contradict our

[TLS] Re: FATT process update

2024-11-05 Thread Salz, Rich
* I think Rich should retitle his document to "A 'permanent' Design Team for TLS", but then we can get on with it. I think my draft served my intended purpose, and while I prefer design team over FATT, I don’t see a reason to push forward on my draft any more. (And thanks for the nice word

[TLS] Re: FATT process update

2024-11-05 Thread Rob Sayre
To clarify here, You can't have a reference here to " A "permanent" Design Group for TLS". That term is wrong and confusing. I don't disagree with all of the rest, which has changed since the last round, but that does need to be fixed up. Maybe Rich doesn't want to update his draft, but that nee

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Arnaud Taddei
I do support the adoption of this draft. This draft is a very good product and the details and care that this draft exhibits is in itself a testimony of someone who has a real production experience, is realistic and pragmatic. There is a big difference between patching an endpoint to

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Eric Rescorla
I am against adoption. As Nick and Watson note, this is not just a profile of TLS 1.2 but is rather a set of negotiated with a new extension code point, i.e., it's effectively a new version of TLS with as yet only lightly analyzed security properties. We already have a new version of TLS which has

[TLS] Re: Fwd: New Version Notification for draft-connolly-tls-mlkem-key-agreement-04.txt

2024-11-05 Thread John Mattsson
Hi Deirdre, I think it would be good to give developers and users an idea of how small the failure rate is. They might not understand what “cryptographically small failure rate” is. OLD: "ML-KEM has a cryptographically small failure rate" NEW: "ML-KEM has a cryptographically small failure rate

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Thom Wiggers
Hi all, I don’t think that we should consider saying that TLS 1.2 (or a variant) is an okay and safe choice for the next 10+ years while this protocol will not receive post-quantum security updates (if we stick with “no PQ for TLS 1.2”). I realize that integrating PQC in a “LTS” deployment migh

[TLS] Re: Fwd: New Version Notification for draft-tls-reddy-composite-mldsa-00.txt

2024-11-05 Thread tirumal reddy
On Mon, 4 Nov 2024 at 19:47, Alicja Kario wrote: > Hello, > > I don't think we should go back to signing with PKCS#1 v1.5 in TLSv1.3. > I'm opposed to including those two IDs: > > mldsa44_rsa_pkcs1_sha256 (0x090C), > mldsa65_rsa_pkcs1_sha384 (0x090D), > I wanted to remove them but I