[TLS]Re: Curve-popularity data?

2024-06-05 Thread Mike Shaver
On Wed, Jun 5, 2024 at 9:19 AM Peter Gutmann wrote: > Nick Harper writes: > > >I see no requirement in section 9 nor in section 4.2.8 requiring MTI > curves > >be present in the key_share extension if that extension is non-empty. > > Just because it's possible to rules-lawyer your way around som

[TLS]Re: Trust Expressions Update

2024-07-19 Thread Mike Shaver
I think this highlights the importance of TLS as a specification used on the web (versus being used an arbitrary protocol between two endpoints) being explicit about what assumptions it is making about how root programs are operated, and how the choices of those root programs manifest for users. I

[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks

2024-07-20 Thread Mike Shaver
On Sat, Jul 20, 2024 at 8:59 AM Ilari Liusvaara wrote: > Allowing various embedded and IoT stuff to migrate off of WebPKI would > be of immense value. Such stuff using WebPKI has been source of gigantic > amount of pain. I agree with your second sentence very much, but I don’t understand your f

[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks

2024-07-22 Thread Mike Shaver
On Sat, Jul 20, 2024 at 2:23 PM David Benjamin wrote: > On Sat, Jul 20, 2024, 06:13 Mike Shaver wrote: > >> In what way are these non-web systems not allowed to use other PKI >> models today? How would trust anchors provide that permission? >> > > If the same s

[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks

2024-07-22 Thread Mike Shaver
On Mon, Jul 22, 2024 at 12:52 PM David Benjamin wrote: > I say sometimes because this is not always viable. It's a more indirect > way of addressing the root issue, so there are some limitations. First, > this requires foresight on the part of the service operator and client > vendor. If everyone

[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks

2024-07-22 Thread Mike Shaver
On Mon, Jul 22, 2024 at 1:36 PM Dennis Jackson wrote: > I would like to hear from the authors (or others in the TLS implementation > community) if they think Trust Expressions / Trust Anchors can be pushed > into non-browser endpoints by default and the work they think would be > required to achi

[TLS]Re: [EXTERNAL] Adoption call for SSLKEYLOG Extension file for ECH

2024-08-15 Thread Mike Shaver
Yeah, I think we will see more inadvertent logging than malicious, just as we have seen passwords mistakenly deposited in logs for approximately as long as we have had both logs and passwords. One challenge with SSLKEYLOG is that there’s no way without very system-specific inspection to detect whe

[TLS] Re: [EXTERNAL] Re: Is there any interest in an RFC on how to do cross-organization mTLS?

2024-09-16 Thread Mike Shaver
Public CAs not only add another risk, but public CAs shouldn't want to be issuing these anyway if they are not for use with the web PKI. I agree that it doesn't seem in scope for the IETF's work, but I'll admit that I'd love to see more advocacy for divorcing such configurations from the public web

[TLS] Re: PKI dynamics and trust anchor negotiation

2025-02-07 Thread Mike Shaver
Hi Watson, On Thu, Feb 6, 2025 at 8:10 PM Watson Ladd wrote: > A negotiation where what is advertised is an inherently opaque > pointer, and where each side must maintain an idea of what that could > mean, does not have this property. Servers have to explicitly act to > support the new identifie

[TLS] Re: Adoption Call for Trust Anchor IDs

2025-01-24 Thread Mike Shaver
I support adoption. Cross-signing has proven a clumsy tool for managing the introduction of new roots, and we need something better. Mike On Wed, Jan 15, 2025 at 11:01 AM Joseph Salowey wrote: > At the trust tussle Interim in October we had consensus that the working > group was interested in

[TLS] Re: WG Adoption Call for Post-Quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3

2025-02-26 Thread Mike Shaver
It's interesting, IMO, that there is so much belief that an RFC designation will drive so much adoption here, but it didn't seem to be the same consensus that enshrining SSLKEYLOGFILE in an RFC might increase the number of systems that support key exfil. To be sure, I don't confidently know which