Re: [TLS] Encrypted SNI

2018-07-03 Thread Brian Sniffen
.gov/library/publications/the-world-factbook/geos/ch.html but see also https://www.cia.gov/library/publications/the-world-factbook/geos/tw.html -- Brian Sniffen ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] DNS-based Encrypted SNI

2018-07-06 Thread Brian Sniffen
I worry that this tool is so weak against a GFW-style adversary for the >> purpose of allowing dissident access to restricted web sites that it will >> be dangerous if released. But maybe I misunderstand the purpose. If this is >> just to keep Western ISPs from monkeying wi

Re: [TLS] kicking off charter revision discussion

2018-10-30 Thread Brian Sniffen
t; The first obligation of an extension, whether it's heartbeat or key escrow, is to show that it isn't going to hurt core TLS to have it out there in the ecosystem. -Brian -- Brian Sniffen Akamai Technologies ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] [Cfrg] 3DES diediedie

2016-08-31 Thread Brian Sniffen
Hilarie Orman writes: >> From: Derek Atkins >> Date: Wed, 31 Aug 2016 10:17:25 -0400 > >> "Steven M. Bellovin" writes: > >> > Yes. To a large extent, the "IoT devices are too puny for real >> > crypto" is a hangover from several years ago. It was once true; for >> > the most part, it isn

Re: [TLS] TLS 1.3 -> TLS 2.0?

2016-08-31 Thread Brian Sniffen
Erik Nygren writes: > I'm also very supportive for the reasons you outline. > > However, I think we should consider calling it TLS 4 or TLS 4.0 or TLS 5. > > In particular, much of the non-technical audience still calls it "SSL" (pet > peeve of many of us, I suspect) and having a version number c

Re: [TLS] Industry Concerns about TLS 1.3

2016-09-24 Thread Brian Sniffen
Folks"  are slow or not working they >>> are just as unhappy as we are. >>> >> >> Isn't that the market operating as expected? Those who deliver a stable >> product at a competitive price are rewarded, while those who fail to deliver >> or del

Re: [TLS] Interest in draft-sullivan-tls-exported-authentication

2017-03-13 Thread Brian Sniffen
rs, >> >> J&S >> ___ >> TLS mailing list >> TLS@ietf.org >> https://www.ietf.org/mailman/listinfo/tls >> > ___ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls -- Brian Sniffen Akamai Technologies ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

[TLS] security considerations for draft-rescorla-tls-subcerts

2017-03-30 Thread Brian Sniffen
kamai and Cloudflare's various patented approaches)---then the primary benefit of delegated credentials is lower latency for session establishment. But maybe the idea is to avoid the first circumstance and emphasize that these are for the second case. Authors, can you describe what you have in mind

Re: [TLS] "Encrypted" SNI

2017-05-11 Thread Brian Sniffen
ons that scale linearly with number of sites hosted) - not everybody's going to do this, not even every TLS 1.3 instance - if networks can't track activity, some will push users to stay on TLS 1.2. -Brian -- Brian Sniffen Akamai Technologies ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Separate APIs for 0-RTT

2017-06-14 Thread Brian Sniffen
sumptions that blur away the difference. -Brian -- Brian Sniffen /(* Akamai - Faster Forward ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] datacenter TLS decryption as a three-party protocol

2017-07-24 Thread Brian Sniffen
escribe above fits into an extension, so (a) it doesn't have to be done to ship TLS 1.3, and (b) it can be available for use in general purpose browsers, and then disabled for the "enterprise" case, and (c) I don't have to worry through the performance implications of not be

Re: [TLS] datacenter TLS decryption as a three-party protocol

2017-07-24 Thread Brian Sniffen
Kyle Rose writes: > On Mon, Jul 24, 2017 at 10:03 AM, Brian Sniffen wrote: > >> I could imagine making the server ECDH share dependent on the >> client ECDH share, plus a local random value. At the end of the >> session, the server discloses that random value, sho

Re: [TLS] WG adoption call: SNI Encryption

2017-08-04 Thread Brian Sniffen
on the draft before 20170818. If you > object to its adoption, please let us know why. I support wg adoption of this draft and am willing to review before 20170818. -Brian -- Brian Sniffen Akamai Technologies ___ TLS mailing list TLS@ietf.org https

Re: [TLS] Fwd: New Version Notification for draft-huitema-tls-sni-encryption-00.txt

2017-08-04 Thread Brian Sniffen
Having promised a review before August 18, I have three issues I'd like to talk about. But first, thanks for keeping pushing on this. I am not sure it will ever see wide adoption, but we'll surely never find out if we don't try. ## Don't stand out I think the requirement that the browser check