Re: [TLS] New cipher suites for SRP

2015-07-15 Thread Dan Harkins
On Mon, June 29, 2015 4:31 am, Hubert Kario wrote: > On Friday 26 June 2015 20:39:24 Geoffrey Keating wrote: >> Dave Garrett writes: >> > On Friday, June 26, 2015 07:48:01 pm Attila Molnar wrote: >> > > Currently SRP cannot be used with newer crypto primitives such as >> > > ciphers in AEAD mode

Re: [TLS] ECDH_anon

2016-01-31 Thread Dan Harkins
On Wed, January 27, 2016 9:47 am, Martin Thomson wrote: > On 28 January 2016 at 02:17, Blumenthal, Uri - 0553 - MITLL > wrote: >> Anon ‎!= Ephemeral, despite some similarities. > >>From a protocol perspective, they are the same. The distinction at > the protocol level between ECDH_RSA (for ex

Re: [TLS] ECDH_anon

2016-02-01 Thread Dan Harkins
On Sun, January 31, 2016 10:00 pm, Martin Thomson wrote: > On 1 February 2016 at 16:56, Dan Harkins wrote: >>>>From a protocol perspective, they are the same. The distinction at >>> the protocol level between ECDH_RSA (for example) and ECDH_anon is >>> that EC

Re: [TLS] JPAKE

2016-02-16 Thread Dan Harkins
On Tue, February 16, 2016 8:34 pm, Tony Arcieri wrote: > On Mon, Feb 15, 2016 at 4:33 PM, Robert Cragie > > wrote: > >> In Thread, it is used for local device authentication and authorisation. >> These use cases clearly benefit from a PAKE, i.e. getting deriving a >> shared >> cryptographic from

Re: [TLS] SRP ?

2016-02-25 Thread Dan Harkins
Hi, On Wed, February 24, 2016 1:59 pm, Rick van Rein wrote: > Hi, > >> Although the lack of modern cipher-suites for SRP makes it not very >> attractive these days. >> > Does anyone know if work on something like "ECSRP" is going on, anywhere? > > We've recently worked on getting it working wit

Re: [TLS] SRP ?

2016-02-26 Thread Dan Harkins
On Thu, February 25, 2016 11:41 pm, Watson Ladd wrote: > On Thu, Feb 25, 2016 at 11:33 PM, Dan Harkins wrote: >> >> Hi, >> >> On Wed, February 24, 2016 1:59 pm, Rick van Rein wrote: >>> Hi, >>> >>>> Although the lack of modern cipher-su

Re: [TLS] Comments on draft-friel-tls-eap-dpp-01

2021-03-08 Thread Dan Harkins
  Hi Scott, On 3/8/21 7:09 AM, Scott Fluhrer (sfluhrer) wrote: Again, last minute reviews… It would appear that the exact computations that both the client and the server need to perform needs to be explicitly spelled out, as there are several possibilities. Here is the one I could see th

Re: [TLS] Comments on draft-friel-tls-eap-dpp-01

2021-03-08 Thread Dan Harkins
  Hi Eric, On 3/8/21 8:00 AM, Eric Rescorla wrote: Taking a step back from the crypto, I'm trying to make sure I understand the desired security properties. As I understand the situation: - the client has a preconfigured key pair (X_c, Y_c) - the server is anonymous (i.e., doesn't have a valid

Re: [TLS] Comments on draft-friel-tls-eap-dpp-01

2021-03-08 Thread Dan Harkins
  Hi Christian, On 3/8/21 11:49 AM, Christian Huitema wrote: The list of requirement reminds me of two scenarios: the Anima problem of "bringing a clean device into the new owner's network"; and the corporate Wi-Fi problem of "connecting a device to the corporate Wi-Fi". In the Anima proble

Re: [TLS] Comments on draft-friel-tls-eap-dpp-01

2021-03-10 Thread Dan Harkins
On 3/10/21 4:12 AM, Eric Rescorla wrote: On Tue, Mar 9, 2021 at 11:43 PM Owen Friel (ofriel) <mailto:ofr...@cisco.com>> wrote: *From:*TLS mailto:tls-boun...@ietf.org>> *On Behalf Of *Eric Rescorla *Sent:* 09 March 2021 06:27 *To:* Dan Harkins mailto:dhar

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Dan Harkins
  Hi,   I approve of this transition to standards track and I am implementing this as well.   regards,   Dan. On 11/29/23 7:51 AM, Joseph Salowey wrote: RFC 8773 (TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key) was originally published as experimental

Re: [TLS] Call for consensus: Removing 0-RTT client auth

2016-04-03 Thread Dan Harkins
Hi Sean & Joe, On Tue, March 29, 2016 5:59 am, Sean Turner wrote: > All, > > To make sure we’ve got a clear way forward coming out of our BA > sessions, we need to make sure there’s consensus on a couple of > outstanding issues. So... > > It seems that there is a clear consensus not to sup

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-03 Thread Dan Harkins
Hi Sean, In general I support this but A stable, publicly available document is basically an RFC. So when the TLS WG says no that means asking an AD to sponsor or putting it into the Independent Stream process. So what it looks like you're doing is punting this problem into the lap of

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Sun, April 3, 2016 7:24 pm, Salz, Rich wrote: > >> A stable, publicly available document is basically an RFC. > > Not always; ISO et al. That's why I said "basically"; it's a qualifier. But keep in mind what kind of stable, publicly available document needs to be published: a descripti

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Thu, March 31, 2016 10:51 am, Stephen Farrell wrote: > > If smaller devices don't use algorithms that can be used to talk to > random servers on the Internet, then they are choosing to not try to > get interop. That seems like a shame to me, unless there's a really > good reason and IMO, mostl

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Mon, April 4, 2016 7:17 am, Watson Ladd wrote: > On Mon, Apr 4, 2016 at 7:05 AM, Dan Harkins wrote: >> >> >> On Thu, March 31, 2016 10:51 am, Stephen Farrell wrote: >>> >>> If smaller devices don't use algorithms that can be used to talk to >&

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Mon, April 4, 2016 8:50 am, Phil Lello wrote: > On Mon, Apr 4, 2016 at 3:36 PM, Dan Harkins wrote: > >> >> Usually what happens is the server generates a self-signed certificate >> and the apps are given some "username" and "password" and the app

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-04 Thread Dan Harkins
On Mon, April 4, 2016 10:46 am, Phil Lello wrote: >> >> >> Usually what happens is the server generates a self-signed >> certificate >> >> and the apps are given some "username" and "password" and the app >> >> ignores the unauthenticated nature of the TLS connection and sends >> >> the u/p crede

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-05 Thread Dan Harkins
On Tue, April 5, 2016 7:42 am, Adam Langley wrote: > On Tue, Apr 5, 2016 at 4:55 PM, Peter Gutmann > wrote: >> How hard can it be to implement TLS-PSK? I did it in a few hours in my >> crypto >> library. > > This is getting off topic (which is my fault) but, for us, it wouldn't > be "just" imple

Re: [TLS] Consensus call for keys used in handshake and data messages

2016-06-15 Thread Dan Harkins
Hello, On Mon, June 13, 2016 12:00 pm, Joseph Salowey wrote: > For background please see [1]. > > Please respond to this message indicating which of the following options > you prefer by Monday June, 20, 2016 > > 1. Use the same key for handshake and application traffic (as in the > current dra

Re: [TLS] I-D Action: draft-ietf-tls-ecdhe-psk-aead-00.txt

2016-07-11 Thread Dan Harkins
I'm glad I have to opportunity to make you happy Sean :-) On Mon, July 11, 2016 7:40 am, Sean Turner wrote: > I think I can take this bit: > > On Jul 10, 2016, at 06:51, Peter Dettman > wrote: >> >> I'm also curious whether there is a precedent in other RFCs for an >> explicit minimum curve bi

Re: [TLS] Comments on TLS-ECJ-PAKE draft

2016-07-18 Thread Dan Harkins
Hi Robert, This draft moves the NamedCurve/EllipticCurveList into the ClientHello, and since the client sends X1 and ZKP(X1) in the ClientHello it means that is going to be a list of 1. It basically moves the client's key exchange portion from ClientKeyExchange into ClientHello. So basically,

Re: [TLS] Comments on TLS-ECJ-PAKE draft

2016-07-20 Thread Dan Harkins
is TLS" > though and whether this approach flouts conventional thinking about TLS > (which, IMHO, it doesn't). > > Robert > > On 18 July 2016 at 11:06, Dan Harkins wrote: > >> >> Hi Robert, >> >> This draft moves the NamedCurve/EllipticCurveL

[TLS] Re: PQ Cipher Suite I-Ds: adopt or not?

2024-12-16 Thread Dan Harkins
  To answer Joe's question, yes I support 4 separate adoption calls for the I-Ds in question. On 12/16/24 2:21 PM, Martin Thomson wrote: On Tue, Dec 17, 2024, at 08:59, Sean Turner wrote: Is the WG consensus to run four separate adoption calls for the individual I-Ds in question? I would like

[TLS] Re: draft-connolly-tls-mlkem-key-agreement

2024-12-12 Thread Dan Harkins
  +1 for adoption   Dan. On 12/12/24 2:06 PM, Filippo Valsorda wrote: 2024-12-07 18:36 GMT+01:00 Watson Ladd : Having MLKEM without a hybrid as an option in TLS when the interoperable choice is a hybrid is not going to exclude people. Furthermore we didn't hybridize x25519 and RSA. It's cle

[TLS] Re: PQ Cipher Suite I-Ds: adopt or not?

2025-01-04 Thread Dan Harkins
  I agree with Scott (and Uri). We have the bandwidth to handle this and the disagreement is over whether "recommended" is Y or N. That contentious point is not going to resolve itself over any reasonable amount of time. Let's just do these two and address that point when the drafts are mature en