Re: [TLS] sect571r1

2015-07-15 Thread Adam Langley
On Wed, Jul 15, 2015 at 1:58 PM, Deirdre Connolly wrote: > >> So, should it stay or should it go now? Opinions? > > +1 that sect571r1 be removed. I also believe that it should be removed. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imp

Re: [TLS] '15 TLS Fall Interim Minutes

2015-09-23 Thread Adam Langley
ted by 1RTT maximum there). I think we quite possibly didn't understand the concern here. Could you spell it out at more length? Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Version in record MAC

2015-10-19 Thread Adam Langley
he property we're looking for here, isn't > it? I don't believe that there's any reason to include the sequence number in the AD input of an AEAD. I think that an empty AD for TLS would be fine now that the content type is encrypted. (Not that I deeply care either way.) Che

Re: [TLS] Version in record MAC

2015-10-27 Thread Adam Langley
s, would have to authenticate their nonces internally. RFC 5297 basically says that already (https://tools.ietf.org/html/rfc5297#section-3). That might mean that the nonce is prepended to the AD inside the AEAD abstraction, but that wouldn't be TLS's concern. Cheers AGL -- Adam Langl

Re: [TLS] I-D Action: draft-ietf-tls-chacha20-poly1305-01.txt

2015-11-02 Thread Adam Langley
or Transport Layer > Security (TLS) > Authors : Adam Langley > Wan-Teh Chang > Nikos Mavrogiannopoulos > Joachim Strombergson > Simon Josefsson > Fi

Re: [TLS] I-D Action: draft-ietf-tls-chacha20-poly1305-01.txt

2015-11-06 Thread Adam Langley
alue for the TLS version in use. Saving a single Poly1305 block per record isn't a big deal and it looks like we'll get it anyway with TLS 1.3. So, for the moment, I'm not planning on adding anything to that effect. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www

Re: [TLS] I-D Action: draft-ietf-tls-chacha20-poly1305-01.txt

2015-11-06 Thread Adam Langley
and is being addressed elsewhere in future versions of TLS. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] I-D Action: draft-ietf-tls-chacha20-poly1305-01.txt

2015-11-06 Thread Adam Langley
he 64-bit record sequence number is serialized as an 8-byte, big-endian value and padded on the left with four 0x00 bytes." Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Application data during renegotiation handshake

2015-11-11 Thread Adam Langley
development, supported this via the CREDENTIAL frame. That also avoided a confused deputy problem: with connection pooling over HTTP/2, there seems to be a risk of confusion about which requests are authenticated with which client certificate. Cheers AGL -- Adam Langley a

Re: [TLS] Review of https://tools.ietf.org/html/draft-ietf-tls-chacha20-poly1305-00

2015-11-12 Thread Adam Langley
; in -01 and changed one key length to bits, but otherwise I think each use is about right. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

[TLS] Early code point assignment request for curve25519 and curve448

2015-11-14 Thread Adam Langley
8 (30), // Signature curves. eddsa_ed25519 (31), eddsa_ed448 (32), I'd like to request that these code points for early assignment. [1] https://mailarchive.ietf.org/arch/msg/ietf-announce/MWmqSxBZxWPEt6glXJZvXg5lMS4 [2] https://tlswg.github.io/tls13-spec/#rfc.section.6.3.2.2 Cheers AGL -- Ad

Re: [TLS] Early code point assignment request for curve25519 and curve448

2015-11-14 Thread Adam Langley
ts are not since the signature work in CFRG is ongoing. I'll leave that to the chairs. (While we would use early code-point assignments for X25519/X448 we don't have plans for using the signature code points at this time.) Cheers AGL -- Adam Langley a...@imperial

Re: [TLS] PRF digest function for ChaCha20-Poly1305 cipher suites

2015-12-20 Thread Adam Langley
not sure that a slower, software implementation of SHA-256 would be a big problem. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

[TLS] draft-ietf-tls-curve25519-01 and the X25519 significant bit.

2015-12-22 Thread Adam Langley
mentations SHOULD reject inputs with the high-bit set. I think that should be dropped. The X25519 function is specified in terms of bytes in draft-irtf-cfrg-curves and I think the TLS spec should just use that draft. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperial

Re: [TLS] draft-ietf-tls-curve25519-01 and the X25519 significant bit.

2015-12-22 Thread Adam Langley
about things like this. I think TLS should handle the byte strings opaquely so that we have uniform behaviour for X25519/X448 and only a single place where it needs to be tested. The behaviour of X25519/X448 for non-reduced values is also specified in the CFRG document. Cheers A

Re: [TLS] draft-ietf-tls-curve25519-01 and the X25519 significant bit.

2015-12-28 Thread Adam Langley
erhaps, even achievable for a spec). So at this point I'd like to nail down the existing behaviour with tests, try to make it uniform across most implementations, and try to avoid other specs interpreting the byte strings. [1] http://cr.yp.to/ecdh/curve25519-20060

Re: [TLS] draft-ietf-tls-curve25519-01: Is public key validation necessary or helpful?

2015-12-30 Thread Adam Langley
On Wed, Dec 30, 2015 at 4:03 PM, Brian Smith wrote: > I think it is a good idea to implement the session hash extension, in > general. However, I think it is a bad idea to prescribe it as the solution > for this particular problem because: > > 1. draft-irtf-cfrg-curves-11, in sections 6.1 and sec

Re: [TLS] draft-ietf-tls-curve25519-01: Is public key validation necessary or helpful?

2015-12-31 Thread Adam Langley
ero check should (or must) be done because I think that it should be done in general. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Require deterministic ECDSA

2016-01-25 Thread Adam Langley
their thing no matter what the standard says, so I wouldn't have an objection to putting a "SHOULD" in the spec for RFC 6979. I suspect that adherence would be poor, however. As for using that RFC over what I came up with or anything else: at least RFC 6979 has been written down alr

Re: [TLS] Remove 0-RTT client auth

2016-02-21 Thread Adam Langley
igin confusion attacks[2] etc.) Cheers AGL [1] https://tools.ietf.org/html/draft-ietf-tokbind-protocol-04 [2] http://antoine.delignat-lavaud.fr/doc/www15.pdf -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Additional TLS 1.3 results from Chrome

2017-12-19 Thread Adam Langley
On Tue, Dec 19, 2017 at 5:07 AM, Stephen Farrell wrote: > I'm not sure I agree renumbering is the right reaction, > though I don't object to that. This could be a case where > it's overall better that those specific devices suffer > breakage, and hopefully then do get firmware updated to > suppor

Re: [TLS] extended headers for (D)TLS (and their use with connection-id)

2018-01-24 Thread Adam Langley
e cited motivation (https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-00) is DTLS-only. Probably this draft needs to be too. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org htt

Re: [TLS] extended headers for (D)TLS (and their use with connection-id)

2018-01-24 Thread Adam Langley
ernel might keep retransmitting some part of the half-connection's data that doesn't include the connection id at all.) Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org ht

Re: [TLS] early code points assigned (was Re: early code point assignment for draft-ietf-tls-certificate-compression)

2018-05-24 Thread Adam Langley
.3, which presumably LTS clients would not, so maybe there's something you could use there. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] early code points assigned (was Re: early code point assignment for draft-ietf-tls-certificate-compression)

2018-05-24 Thread Adam Langley
value in https://tools.ietf.org/html/draft-ietf-quic-tls-12#section-9.2, authored by Sean :) So we have a triple collision on 26, albeit with one candidate being much more official. Sean: do you want to kick quic_transport_parameters off 26 then? Move it to a high, random value until assigned? --

Re: [TLS] Protocol Action: 'IANA Registry Updates for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)' to Proposed Standard (draft-ietf-tls-iana-registry-updates-05.txt)

2018-05-30 Thread Adam Langley
ues with concurrent applications and I offer 0xbb31 as a high-quality, random number. Since we had a triple collision in this case, random-assignment's virtues are currently particularly clear.) -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___

Re: [TLS] Broken browser behaviour with SCADA TLS

2018-07-05 Thread Adam Langley
48-bit RSA minimum in the client as the CA/BF rules suffice for the vast, vast majority of users. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Further TLS 1.3 deployment updates

2018-12-14 Thread Adam Langley
y clients getting established in the mean time. We are painfully aware that limiting our server-side deployment allowed this bug to become established and, while we did it to ease middlebox issues, it may have been a mistake. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.i

[TLS] Yet more TLS 1.3 deployment updates

2019-01-22 Thread Adam Langley
265024 Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Question about draft-thomson-tls-sic

2019-07-23 Thread Adam Langley
On Tue, Jul 23, 2019 at 5:23 PM Watson Ladd wrote: > Suppose the following sequence of events happen: > > 1: A CA uses a new intermediate for reasons (no longer cross-signing, etc.) > 2: A site gets a certificate from the new intermediate. > 3: An older firefox version connects and thinks it know

Re: [TLS] TLS Flags extension - not sure it makes sense

2019-07-23 Thread Adam Langley
On Tue, Jul 23, 2019 at 3:09 PM Chris Inacio wrote: > I really want the savings on the wire that TLS flags extension provides – and > so I think it’s really good for the future cTLS but I’m not sure when I get > to use it in TLS 1.3 negotiation. It goes in the clientHello message, but > how wi

Re: [TLS] Adoption call for draft-davidben-tls13-pkcs1

2019-11-14 Thread Adam Langley
On Mon, Nov 11, 2019 at 11:33 AM Christopher Wood wrote: > The adoption call is now (belatedly) finished. At this time, there's not > enough interest to take this on as a WG item. We encourage further > discussion on the list, perhaps based on subsequent draft updates, and will > revisit adoption

[TLS] Accepting that other SNI name types will never work.

2016-03-03 Thread Adam Langley
s://github.com/openssl/openssl/blob/OpenSSL_1_0_1-stable/ssl/t1_lib.c#L1066 – note that the data pointer is not updated. [3] https://tools.ietf.org/html/rfc4366#section-3.1 Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org __

Re: [TLS] Accepting that other SNI name types will never work.

2016-03-03 Thread Adam Langley
On Thu, Mar 3, 2016 at 10:56 AM, Eric Rescorla wrote: > Note: it's already the case that it's forbidden to send >1 of any given type > of name. NSS does not presently enforce this rule but will do so soon. (We have enforced that for a while without issues.) Cheers AGL

Re: [TLS] Accepting that other SNI name types will never work.

2016-03-09 Thread Adam Langley
her than a new SNI type. Additionally, I'm suggesting that, in general, it's a good idea to avoid nesting extension-like structures inside an extension in favour of adding top-level extensions as needed. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org

Re: [TLS] Are the AEAD cipher suites a security trade-off win with TLS1.2?

2016-03-19 Thread Adam Langley
On Wed, Mar 16, 2016 at 6:14 PM, Paterson, Kenny wrote: >>provokes me to bring it up. Here's the crux of it; is it really a >>security win to recommend the AEAD cipher suites for TLS 1.2 users? I'm skeptical about the benefit of padding to 16 bytes. While it does increase the size classes in your

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Adam Langley
;s a lot of work to do it right and it's unclear that we would be able to get a useful mass of devices supporting such a scheme. The mostly likely outcome seems to be that we would end up with a complex addition that's rarely used and thus doesn't justify the cost. Chee

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-05 Thread Adam Langley
mple code for all the vendors, deal with the resulting bugs in implementations and many smaller things besides. That's not to say that we wouldn't be willing to put the effort in, but the demand hasn't been evinced yet. Cheers AGL -- Adam Langley a...@imperialviole

Re: [TLS] Keeping TLS extension points working

2016-07-27 Thread Adam Langley
to the padding extension (RFC 7685). On the other hand, we've seen what's happened to the version field, which is moving too slowly to resist rusting. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS

Re: [TLS] KeyUpdate and unbounded write obligations

2016-08-18 Thread Adam Langley
On Thu, Aug 18, 2016 at 11:55 AM, David Benjamin wrote: > It seems desired_minimum_receive_generation can only be > current_receive_generation or current_receive_generation + 1. In that > case, a boolean should be sufficient and saves 7 bytes. > Given that simplification, is there a purpose for

Re: [TLS] KeyUpdate and unbounded write obligations

2016-08-18 Thread Adam Langley
On Thu, Aug 18, 2016 at 12:20 PM, Keith Winstein wrote: > Yes, you need current_receive_generation, or something like it, to get > P3. This is the subject of our PR #426/580. > The KeyUpdate messages are encrypted and thus sequenced with all the application data. Apart from the Heartbeat message

Re: [TLS] KeyUpdate and unbounded write obligations

2016-08-18 Thread Adam Langley
On Thu, Aug 18, 2016 at 1:36 PM, Keith Winstein wrote: > On the value of P3, I think you're giving us a crimped reading. We > gave three use cases in Berlin and in my email: > I think I was because I hadn't seen your Berlin presentation. But I'm still going to hijack this thread and ask you to e

Re: [TLS] KeyUpdate and unbounded write obligations

2016-08-19 Thread Adam Langley
k that IoTish devices would care this much about doing the right thing, although I suspect we're more likely to get more fodder for Matthew Garrett ( https://mjg59.dreamwidth.org/43486.html). I would still tend towards not including the generation because I don't believe that it's going to be used. But if, in a blaze of optimism, people think it will, I'm not going to be too upset. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] KeyUpdate and unbounded write obligations

2016-08-29 Thread Adam Langley
d keys outstanding, > but these cannot be used to produce the write keys. However, this probably > isn't simpler than just running two ladders if we think this is important. That works but I agree that splitting the ladders is nicer and I think that we should do

Re: [TLS] BoringSSL's TLS test suite

2016-09-25 Thread Adam Langley
On Sun, Sep 25, 2016 at 2:06 PM, Henrick Hellström wrote: > Have you noticed that BoringSSL seems to abort handshakes with an > illegal_parameter alert, if the server certificate uses the standard > compliant (albeit highly unusual) DER encoding of NULL OPTIONAL as the empty > string, instead of t

Re: [TLS] BoringSSL's TLS test suite

2016-09-25 Thread Adam Langley
irically has very good compatibility and we don't like adding flexibility without good reason. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] draft-ietf-tls-tls13-16

2016-09-28 Thread Adam Langley
27;d hope that a default would work for the vast majority of TLS 1.3 users. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Working Group Last Call for draft-ietf-tls-tls13-18

2016-11-09 Thread Adam Langley
On Wed, Nov 9, 2016 at 11:42 AM, Martin Rex wrote: > in reality, the Google servers perform pathological fragmentation > of the AppData and use a whooping 36 TLS records for the response > (curiously no TLS AppData record split between header and body). > At the beginning of a connection we aim

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-11-18 Thread Adam Langley
On Fri, Nov 18, 2016 at 7:49 AM, Will Serumgard wrote: > At this point it is a little late to change. I say stay with TLS1.3. As > some others pointed out maybe we can make a jump in the next version. > Renumbering SSL 3.1 as TLS 1.0 was a mistake in the first place, but I don't believe that cha

Re: [TLS] WG adoption call: draft-davidben-tls-grease

2016-12-08 Thread Adam Langley
On Thu, Dec 8, 2016 at 10:56 AM, Eric Rescorla wrote: > +1 > I'm not sure whether I could as an independent voice on this topic, but I strongly support adoption of this draft. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperia

[TLS] Requiring that (EC)DHE public values be fresh

2016-12-29 Thread Adam Langley
.org/doc/draft-green-tls-static-dh-in-tls13/ Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Requiring that (EC)DHE public values be fresh

2016-12-29 Thread Adam Langley
On Thu, Dec 29, 2016 at 11:28 AM, Martin Rex wrote: > First of all, forward secrecy is equally defeated by TLS session caching > (traditional as well as session tickets), and the effect of rfc5077 > TLS session tickets is likely at least a magnitude worse--and cannot > be "fixed" by clients purgin

Re: [TLS] cross-domain cache sharing and 0rtt (was: Re: Requiring that (EC)DHE public values be fresh)

2016-12-29 Thread Adam Langley
On Thu, Dec 29, 2016 at 11:08 AM, Eric Rescorla wrote: >> >> As an individual, I'd be in favour of this change but reading >> >> over [1], section 5, I wondered if we'd analysed the effects of >> >> 0rtt/replayable-data with that kind of cross-domain re-use in mind? >> >> The situation being where

Re: [TLS] Requiring that (EC)DHE public values be fresh

2016-12-31 Thread Adam Langley
> such a mechanism probably isn't going to have much effect on the > latter intentional badness. I much prefer people who are going to backdoor their TLS to use DH as the mechanism rather than something less detectable. I don't expect a MUST NOT will slow them down at all. I ju

Re: [TLS] [SUSPECTED URL!]Re: Requiring that (EC)DHE public values be fresh

2017-01-02 Thread Adam Langley
On Mon, Jan 2, 2017 at 11:43 AM, Yoav Nir wrote: > I’m assuming that the server generates private keys and saves them to a file > along with the time period that they were used, and another machine in a > different part of the network records traffic. It’s not so much that the > clocks need to be

Re: [TLS] [SUSPECTED URL!]Re: Requiring that (EC)DHE public values be fresh

2017-01-09 Thread Adam Langley
On Mon, Jan 2, 2017 at 3:57 PM, Adam Langley wrote: > I don't expect that those who want to intercept TLS connections will > see a MUST NOT and go do something else. Rather I think they should > understand that TLS isn't supposed to be intercepted and, if they want > to

Re: [TLS] PSS and TLS 1.3

2017-01-20 Thread Adam Langley
On Fri, Jan 20, 2017 at 11:29 AM, Brian Smith wrote: > RSA PSS with a zero-length salt is a deterministic, > subliminal-channel-free signature scheme. It is one of the few > signature schemes that structurally prevent an HSM from directly > leaking (parts of) the private key in an undetectable way

Re: [TLS] Question about unrecognized extension types in the TLS 1.3 client hello message

2017-01-30 Thread Adam Langley
On Mon, Jan 30, 2017 at 1:41 PM, Scott Fluhrer (sfluhrer) wrote: > My question: in TLS 1.3, if the client inserts an extension of a type that > the server does not recognize, how must the server behave? Is it required > that the server just ignore the extension, or can it take some other action >

Re: [TLS] TLS 1.3 Record Layer Format

2017-03-06 Thread Adam Langley
but I hope to do so in the coming weeks.) Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Improved nonce generation method for TLS 1.3

2017-06-02 Thread Adam Langley
number in rcx: leaq maskOffset(%rax), %rbx ; xorq (%rbx), %rcx ; movbeq %rcx, 4(%rdi) Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] WG adoption call: SNI Encryption

2017-08-04 Thread Adam Langley
en at some point. So which are we talking about adopting? While drafts evolve during the WG process, there's a big gap between the two ideas and I'd support one but not the other. Thus I'm not sure that the draft is ready for an adoption call at this time. Cheers AGL

Re: [TLS] WG adoption call: SNI Encryption

2017-08-04 Thread Adam Langley
On Fri, Aug 4, 2017 at 11:03 AM, Tony Arcieri wrote: > On Fri, Aug 4, 2017 at 10:39 AM, Adam Langley > wrote: > >> If it wants to be a technical document, then the draft includes two very >> different designs with a note saying that one will be chosen at some point. >&

Re: [TLS] WG adoption call: SNI Encryption

2017-08-05 Thread Adam Langley
ventually we have to pick one, right? I feel that drafts are generally more opinionated before a call for adoption, although the chairs might well feel that the design-space span is this document is focused enough already. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialv

Re: [TLS] WG adoption call: draft-thomson-tls-record-limit

2017-08-07 Thread Adam Langley
e willing to review/comment on the draft before 20170818. If you > object to its adoption, please let us know why. > I support adoption. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list

Re: [TLS] Update on TLS 1.3 Middlebox Issues

2017-10-07 Thread Adam Langley
emonstrates the sort of change in thinking that is needed, but that we need to go further. Cheers AGL -- Adam Langley a...@imperialviolet.org https://www.imperialviolet.org ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls