Re: [TLS] CH padding extension

2018-06-12 Thread Kyle Nekritz
Since the Certificate message is sent in an encrypted record, the normal record padding mechanism (section 5.4) can be used, rather than sending the padding as actual handshake data. -Original Message- From: TLS On Behalf Of Christopher Wood Sent: Tuesday, June 12, 2018 1:41 PM To: Su

Re: [TLS] Enforcing Protocol Invariants

2018-06-13 Thread Kyle Nekritz
I think there may be lower overhead ways (that don’t require frequent TLS library code changes) to prevent ossification of the ServerHello using a mechanism similar to the cleartext cipher in quic. For example, a client could offer an “anti-ossification” extension containing an identifier that

Re: [TLS] Enforcing Protocol Invariants

2018-06-14 Thread Kyle Nekritz
key from a previous connection completely avoids that issue (for example the server sends an encrypted extension with identifier X and key Y, which the client remembers for future connections). From: Steven Valdez Sent: Thursday, June 14, 2018 10:35 AM To: Kyle Nekritz Cc: David Benjamin

Re: [TLS] consensus call: draft-ietf-tls-ticketrequests

2020-03-05 Thread Kyle Nekritz
No. FWIW, we (at my day job) run TLS 1.3 at large scale for server-to-server RPC communication, and have seen no appreciable performance overhead from ticket refresh on resumption. I also have no objection to Martin's proposal. Kyle -Original Message- From: TLS On Behalf Of Sean Turn

[TLS] Limiting replay time frame of 0-RTT data

2016-03-11 Thread Kyle Nekritz
Similar to the earlier discussion on 0.5-RTT data, I'm concerned with the long term ability to replay captured 0-RTT early data, and the attack vectors that it opens up. For example, take a GET request for an image to a CDN. This is a request that seems completely idempotent, and that applicatio

Re: [TLS] analysis of wider impact of TLS1.3 replayabe data

2016-03-14 Thread Kyle Nekritz
I think that idempotency is a relatively straightforward idea, it seems reasonable to trust that the application layer will only send 0-RTT data that is idempotent in terms of server-side state. I also don't think it's that much different than the current state of TLS. Providing strict replay pr

Re: [TLS] Limiting replay time frame of 0-RTT data

2016-03-14 Thread Kyle Nekritz
ouldn't you also just include the information in the HTTP header for HTTP? Do you think this is a sufficiently general issue that it merits a change to TLS. -Ekr On Fri, Mar 11, 2016 at 9:21 PM, Kyle Nekritz mailto:knekr...@fb.com>> wrote: Similar to the earlier discussion on 0.5-RTT dat

Re: [TLS] analysis of wider impact of TLS1.3 replayabe data

2016-03-14 Thread Kyle Nekritz
If a client nonce cache is used then the threat is essentially the same as with ordinary retries. As far as forward secrecy, yes, the 0-RTT data loses some forward secrecy. I think this is a reasonable trade off for a lot of use cases. Currently, TLS 1.2 implementations commonly use session tic

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Kyle Nekritz
I think this will better account for the round trip delay if the elapsed_time is defined on the client as the time since the request for the session ticket (in other words, the time since the client hello was sent). That way both the server computed time and the client reported time will include

Re: [TLS] Narrowing the replay window

2016-03-29 Thread Kyle Nekritz
On 30 March 2016 at 04:45, Kyle Nekritz wrote: > I think this will better account for the round trip delay if the elapsed_time > is defined on the client as the time since the request for the session ticket > (in other words, the time since the client hello was sent). Unfortunately,

Re: [TLS] Asking for certificate authentication when doing 0-RTT

2016-05-24 Thread Kyle Nekritz
What is the rationale for restricting a change in certificate? If the server has a new certificate that the client would accept with a full handshake, what threat is added by also accepting that certificate with a PSK handshake? Requiring the certificate to remain the same will make rollout of a

[TLS] ALPN with 0-RTT Data

2016-10-12 Thread Kyle Nekritz
Currently the draft specifies that the ALPN must be "the same" as in the connection that established the PSK used with 0-RTT, and that the server must check that the selected ALPN matches what was previously used. I find this unclear if 1) the client should select and offer one (and only one) ap

Re: [TLS] ALPN with 0-RTT Data

2016-10-12 Thread Kyle Nekritz
go away. Kyle From: Eric Rescorla [mailto:e...@rtfm.com] Sent: Wednesday, October 12, 2016 4:03 PM To: David Benjamin Cc: Kyle Nekritz ; tls@ietf.org Subject: Re: [TLS] ALPN with 0-RTT Data On Wed, Oct 12, 2016 at 1:01 PM, David Benjamin mailto:david...@chromium.org>> wro

[TLS] Deprecating alert levels

2016-10-14 Thread Kyle Nekritz
After PR #625 all alerts are required to be sent with fatal AlertLevel except for close_notify, end_of_early_data, and user_canceled. Since those three alerts all have separate specified behavior, the AlertLevel field is not serving much purpose, other than providing potential for misuse. We (Fa

Re: [TLS] Deprecating alert levels

2016-10-17 Thread Kyle Nekritz
ewhat dangerous. -Original Message- From: Martin Thomson [mailto:martin.thom...@gmail.com] Sent: Sunday, October 16, 2016 5:53 AM To: Kyle Nekritz Cc: tls@ietf.org Subject: Re: [TLS] Deprecating alert levels I'm sympathetic to this, but just to be clear... You are suggesting that e

Re: [TLS] SNI and Resumption/0-RTT

2016-10-24 Thread Kyle Nekritz
I do think this should be allowed if the client is satisfied with the previous identities presented. We currently allow resumption across domains supported by our wildcard certificate (I believe this is fairly common practice), and our clients take advantage of this to improve their resumption r

Re: [TLS] Deprecating alert levels

2016-10-24 Thread Kyle Nekritz
+1 to both Martin and ekr, I think simplifying these alerts with clearly defined behavior for each alert description is the best way forward. Kyle -Original Message- From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Martin Thomson Sent: Wednesday, October 19, 2016 10:18 PM To: Eric R

Re: [TLS] (no subject)

2017-02-15 Thread Kyle Nekritz
I have a small preference for option 1. I think in a way #2 and #3 require a special case as well for the PSK binder transcript. Unless we consider the truncated ClientHello and the rest of the ClientHello separate messages, the handshake hash will have to move backwards after computation of the

Re: [TLS] WGLC: draft-ietf-tls-tls13-19

2017-03-28 Thread Kyle Nekritz
I raised this before in PR #693 (https://www.ietf.org/mail-archive/web/tls/current/msg21600.html). I'm not sure it makes sense to rename this to legacy while other parts of the document still refer to it. But I'm definitely in favor of deprecating it. From: TLS on behalf of Dave Garrett Sent

Re: [TLS] Security review of TLS1.3 0-RTT

2017-05-04 Thread Kyle Nekritz
> 1. A SHOULD-level requirement for server-side 0-RTT defense, explaining both > session-cache and strike register styles and the merits of each. First, a point of clarification, I think two issues have been conflated in this long thread: 1) Servers rejecting replayed 0-RTT data (using a single

Re: [TLS] Security review of TLS1.3 0-RTT

2017-05-04 Thread Kyle Nekritz
ile-connections/ ). From: Eric Rescorla [mailto:e...@rtfm.com] Sent: Thursday, May 4, 2017 5:37 PM To: Kyle Nekritz Cc: Colm MacCárthaigh ; tls@ietf.org Subject: Re: [TLS] Security review of TLS1.3 0-RTT On Thu, May 4, 2017 at 2:27 PM, Kyle Nekritz mailto:knekr...@fb.com>> wrote: > 1. A S

Re: [TLS] Security review of TLS1.3 0-RTT

2017-05-22 Thread Kyle Nekritz
The stateless technique certainly doesn’t solve all issues with replay. Neither do the other techniques, unless a fairly unrealistic (imo, in most use cases) retry strategy is used. But the stateless technique is definitely an improvement over no anti-replay mechanism at all (for instance it red

Re: [TLS] 2nd WGLC: draft-ietf-tls-tls13

2017-07-18 Thread Kyle Nekritz
Timestamps outside the expected window can happen due to variances in RTT, client clock skew, etc. (we see around .1% of clients outside of a 30s window for example). Not likely to happen on a given connection, but it certainly happens enough that you don’t want to abort the connection (rather t

Re: [TLS] WG Adoption for TLS Trust Expressions

2024-04-26 Thread Kyle Nekritz
may only be feasible for large operators, and will harm the TLS ecosystem), and that we will be adding roadblocks to deployment of more modern trust stores. There’s still details to work out, but I support adoption of the draft as a good starting point. Kyle Nekritz From: TLS On Behalf Of

[TLS]Re: Consensus Call: -rfc8446bis PRs #1343 & #1345

2024-06-06 Thread Kyle Nekritz
I object to 1343 because I don't think it can be implemented without risking interop problems. There is nothing tying a KeyUpdate response to the KeyUpdate that requested it, or distinguishing it from an unrelated KeyUpdate. As an example of how this can cause practical problems, say we have two

[TLS]Re: Consensus Call: -rfc8446bis PRs #1343 & #1345

2024-06-12 Thread Kyle Nekritz
ould make the requirement more clear, and avoid enforcement of a requirement that can’t be strictly followed. From: David Benjamin Sent: Thursday, June 6, 2024 5:48 PM To: Kyle Nekritz Cc: Sean Turner ; TLS List Subject: Re: [TLS]Re: Consensus Call: -rfc8446bis PRs #1343 & #1345 Regarding

[TLS]Re: Trust Expressions Update

2024-07-21 Thread Kyle Nekritz
On the surveillance risks, what differentiates trust negotiations from other existing negotiation mechanisms? Any negotiation mechanism comes with risks that it will be used to negotiate something problematic. It's not clear to me why trust negotiation is significantly different in this regard t

[TLS]Re: Meta deploying -hybrid-design

2024-08-13 Thread Kyle Nekritz
> This demonstrates a very common misconception about TCP. I know that some > implementation choke if the TLS ClientHello spans multiple TCP segments such > that it requires multiple reads. David Benjamin has written about this > several times. It's rare though and a bad basis to make decisio

[TLS]Re: Adoption call for SSLKEYLOG Extension file for ECH

2024-08-13 Thread Kyle Nekritz
I support adoption. SSLKEYLOG is a useful debugging tool, and there's no good reason negotiating ECH should break it. -Original Message- From: Sean Turner Sent: Thursday, July 25, 2024 12:16 PM To: TLS List Subject: [TLS]Adoption call for SSLKEYLOG Extension file for ECH At the IETF 1

[TLS] Re: Adoption Call for Trust Anchor IDs

2025-01-24 Thread Kyle Nekritz
I support adoption. As our PKIs change, we need mechanisms to allow servers to move forward, while maintaining widespread compatibility. While currently available mechanisms (eg cross signing) can help in some circumstances, they are not sufficient. Trust negotiation has unique challenges, and