Re: [TLS] PR#1091: Changes to provide middlebox robustness

2017-12-04 Thread Alex C
The obvious problem with randomly adding fake versions is you have to have a way of ensuring they won't conflict with *real* future versions - and whatever pattern you decide upon in order to do that, middleboxes will use that pattern to filter out fake versions, and fail as soon as you present one

Re: [TLS] PR#1091: Changes to provide middlebox robustness

2017-12-06 Thread Alex C
Thanks for the info. I see a pull request has just been submitted already: https://github.com/tlswg/tls13-spec/pull/1116 On Tue, Dec 5, 2017 at 1:03 AM, Eric Rescorla wrote: > > > On Mon, Dec 4, 2017 at 1:59 AM, Alex C wrote: > >> The obvious problem with randomly adding fa

Re: [TLS] (crypto agility may benefit from private extensions) Re: Additional changes for draft-ietf-tls-iana-registry-updates

2018-03-23 Thread Alex C
I'm hesitant to call a 16-bit registry "big" in any context. But if allocating a value requires a specification, that's probably okay. (There aren't even close to 2^16 RFCs in total) On Wed, Mar 21, 2018 at 3:54 AM, Eric Rescorla wrote: > > > On Tue, Mar 20, 2018 at 2:51 PM, Rene Struik > wrote

Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-23 Thread Alex C
As I understand it (poorly!) the idea is exactly to have a single system on the network that monitors all traffic in cleartext. It's fundamentally impossible to prevent someone from copying all their traffic to another system in cleartext. If they're going to do it, they will. The functionality is

Re: [TLS] potential attack on TLS cert compression

2018-04-20 Thread Alex C
It seems to me that if this is a valid threat model, then all software is potentially vulnerable. TLS records are carried over TCP segments. What if an attacker can change the way records are divided into segments, and thereby trigger a bug in the record parser? On Fri, Apr 20, 2018 at 9:40 AM, V

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Alex C
What exactly is the threat model here? Are you trying to hide a connection from a reverse proxy at the server end? If so, the server operator should not have deployed a reverse proxy in the first place. Are you trying to hide from a MITM proxy that supplies its own certificate? If so, then what p

Re: [TLS] New Version Notification for draft-friel-tls-over-http-00.txt

2017-11-07 Thread Alex C
tion layer. > > This allows us to provide end-to-end security across a proxy (in this > case the phone) and independent of the underlying protocols. > > Does this make sense? > > Ciao > Hannes > > > On 11/07/2017 10:21 AM, Alex C wrote: > > What exactly is the