Re: [TLS] Use-case for non-AEAD ciphers in network monitoring

2021-05-17 Thread Darin Pettis
Thanks to Eric and Rich for your technical responses and cautionary statements. I do see that Florian’s use-case below points to the continued need for enterprise inspection as once the data lands inside the data center they become the custodians of it and are responsible for the security and perf

Re: [TLS] Use-case for non-AEAD ciphers in network monitoring

2021-05-17 Thread Darin Pettis
…use case* Thanks in advance, Darin Pettis On Mon, May 17, 2021 at 3:33 PM Darin Pettis wrote: > Thanks to Eric and Rich for your technical responses and cautionary > statements. > > I do see that Florian’s use-case below points to the continued need for > enterprise inspect

Re: [TLS] Use-case for non-AEAD ciphers in network monitoring

2021-05-17 Thread Darin Pettis
now, it would be great to address the need proactively. Respectfully, Darin On Mon, May 17, 2021 at 3:48 PM Stephen Farrell wrote: > > Hiya, > > On 17/05/2021 21:33, Darin Pettis wrote: > > TLS 1.3 did a great job regarding safety of data on the Internet. For the > > next

Re: [TLS] Encrypted SNI hangout

2017-11-12 Thread Darin Pettis
Sean - thank you for the update and options on rooms. Ben and Brett - which room should we meet in? Initially opposed to encrypting SNI as it appears to break many services that utilize it but curious to hear more. Thx On Mon, Nov 13, 2017 at 9:17 AM Christian Huitema wrote: > On 11/12/2017

Re: [TLS] TLS@IETF101 Agenda Posted

2018-03-08 Thread Darin Pettis
Artyom, Thanks for mentioning the ID and you are right that draft Fenter is the supporting problem description. The reason it was written was to help folks understand why legitimate internal out-of-band decryption is still needed on data once it reaches its destination and that there isn’t a viabl

Re: [TLS] TLS@IETF101 Agenda Posted

2018-03-13 Thread Darin Pettis
Richard Barnes and Rich Salz, Thank you for the kind words. They are much appreciated! Best of luck to Rich with the health concerns too. It’s been an interesting journey with a lot of great folks. Will reply to the issues later as I need to head out at the moment. -Darin On Tue, Mar 13, 20

Re: [TLS] Breaking into TLS to protect customers

2018-03-18 Thread Darin Pettis
Agreed. I know a lot of good work has gone into TLS 1.3 and having visibility to the data once it hits the data center seems like a new capability to the good folks working that have had TLS 1.3 in mind for the last couple years. But to enterprises, they have visibility to their data today and

Re: [TLS] Encrypted SNI

2018-07-03 Thread Darin Pettis
+1 On Tue, Jul 3, 2018 at 12:08 PM Bret Jordan wrote: > From a discussion on the PATIENT list found here: > https://www.ietf.org/mail-archive/web/patient/current/msg00078.html > > > From my personal perspective, we need to be careful with all of these > efforts. It feels like the pendulum has

Re: [TLS] Adoption call for draft-davidben-tls13-pkcs1

2019-12-06 Thread Darin Pettis
On Thu, Nov 14, 2019 at 4:43 PM Adam Langley wrote: People on this list who manage large corporate networks may wish to pay attention to this: while you may not have updated servers to TLS 1.3 yet, eventually it'll happen and I suspect some will find a significant amount of things like TPMs, in wh

Re: [TLS] Weekly github digest (TLS Working Group Drafts)

2020-04-12 Thread Darin Pettis
Hi - trying to understand the intent of this: “Don’t stick out” approach to eSNI, now being called ECHO apparently. About a year ago, the understanding was that eSNI would be identifiable and that enterprises wouldn’t need to use it internally and that it would only be used on the Internet. Is t

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-11-21 Thread darin . pettis
are currently aware of it) know it by. However, as the new standard goes out into the world, a major revision number seems appropriate to recognize the significant changes that have gone into it. +1 Darin Pettis U.S. BANCORP made t

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-12-02 Thread darin . pettis
+1 with Andrei. "That SSL should never be used" is the one clear message we have so going back to SSL would muddy those waters too much. Strong vote for staying with TLS. It will become better known over time- especially with the current enterprise push to deprecate all SSL versions from use

Re: [TLS] Publication of draft-rhrd-tls-tls13-visibility-00

2017-10-19 Thread Darin Pettis
On Thu, Oct 19, 2017 at 12:27 PM Salz, Rich wrote: > We disagree. > > Being able to block traffic is much less effort than pretending to be > another identity. > > ___ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > Firs