[TLS] Re: Errata 4800

2025-03-08 Thread Michael StJohns
Hi Martin - you said: TLS is full of this sort of thing. The point being that the maximum values exist to define the size of the length field, not the practical limits. In that case, since this function is obsoleted, and there's nowhere to actually put an update to the document, I would sugg

[TLS] Weekly github digest (TLS Working Group Drafts)

2025-03-08 Thread Repository Activity Summary Bot
Issues -- * tlswg/dtls13-spec (+16/-2/šŸ’¬3) 16 issues created: - Contributions from David Benjamin (by hannestschofenig) https://github.com/tlswg/dtls13-spec/issues/315 - Check with Implementers (by hannestschofenig) https://github.com/tlswg/dtls13-spec/issues/313 - Replay protect

[TLS] Re: Errata 4800

2025-03-08 Thread Martin Thomson
I don't think that Verified is quite right. It's true that the maximum possible length of a ClientIdentity doesn't fit into the structure defined. But nor does it fit into handshake messages (though the overflow is potentially smaller). TLS is full of this sort of thing. The point being that

[TLS] Re: Errata 4800

2025-03-08 Thread Salz, Rich
Is there a "TLS Style Guide" or something similar that captures this? (I think I knew this as a background noise thing as being different from how ASN1 does length field encoding...) Look at the ā€œpresentation languageā€ section of the TLS RFCs ___ TLS m

[TLS] Re: [EXTERNAL] Re: Disallowing reuse of ephemeral keys

2025-03-08 Thread John Mattsson
Hi, I missed this thread, but Ericsson put a lot of effort on this topic in our recent comments to NIST, which might be of interest for people in TLS WG: https://emanjon.github.io/NIST-comments/2025%20-%20SP%20800-227.pdf https://csrc.nist.gov/csrc/media/Events/2025/workshop-on-guidance-for-kem