Re: [TLS] [OPSEC] Call For Adoption: draft-wang-opsec-tls-proxy-bp

2020-07-27 Thread Nick Harper
As currently written, this draft has multiple problems. Section 4 decides not to repeat the Protocol Invariants described in section 9.3 of RFC 8446. However, further sections are written assuming that a proxy acts in a way contrary to those Protocol Invariants. One such example is section 4.2 in

Re: [TLS] [OPSAWG] CALL FOR ADOPTION: draft-reddy-opsawg-mud-tls

2020-09-15 Thread Nick Harper
I agree with EKR, Ben Schwartz, and Watson Ladd's concerns on this draft. The grease_extension parameter shouldn't exist, and there should be no special handling for GREASE values. GREASE doesn't need to be mentioned in this draft, except to say that a client may send values (cipher suites, extens

Re: [TLS] Is stateless HelloRetryRequest worthwhile? (was Re: TLS 1.3 Problem?)

2020-10-01 Thread Nick Harper
On Thu, Oct 1, 2020 at 7:05 AM Michael D'Errico wrote: > > I am having a difficult time understanding the tradeoffs you're facing. > > This is the first time I'm reading the TLS 1.3 RFC. I have > implemented SSLv3, TLS 1.0, 1.1, and 1.2. You may have > used my test server at https www dot mikes

Re: [TLS] PR#28: Converting cTLS to QUIC-style varints

2020-10-06 Thread Nick Harper
On Tue, Oct 6, 2020 at 11:37 AM Michael D'Errico wrote: > I think we are in agreement. > > On 10/6/20 13:12, Christian Huitema wrote: > > * Receiver side: receive the message, parser with generic ASN.1 decoder, > > process the message using the "parsed" representation, re-encode with > > DER, che

Re: [TLS] PR#28: Converting cTLS to QUIC-style varints

2020-10-06 Thread Nick Harper
I have no strong opinion on how this is formatted. I'd base my decision on what the maximum value cTLS needs to encode: If 2^22-1 is sufficient, let's keep it as is, otherwise let's change it to the QUIC format (or some other change to increase the max value). I do like that the existing scheme, co

Re: [TLS] Flags extension and announcing support

2021-01-22 Thread Nick Harper
On Thu, Jan 21, 2021 at 9:46 PM Martin Thomson wrote: > In other words, each flag is treated just like an empty extension: you can > initiate an exchange with it, but you can only answer with it if it was > initiated with it. > > I agree that this is the correct guiding principle for handling fla

Re: [TLS] [EXTERNAL] Re: Narrowing allowed characters in ALPN ?

2021-05-20 Thread Nick Harper
On Thu, May 20, 2021 at 11:19 AM Viktor Dukhovni wrote: > On Thu, May 20, 2021 at 01:46:38PM -0400, Ryan Sleevi wrote: > > > > It is fine for the TLS protocol to not care, but the *standard* ALPN > > > values in the IANA registry (that might then also appear in DNS > > > zone files, configuration

Re: [TLS] [EXTERNAL] Re: Narrowing allowed characters in ALPN ?

2021-05-20 Thread Nick Harper
On Thu, May 20, 2021 at 3:56 PM Viktor Dukhovni wrote: > I agree it is a straight-forwarding encoding for machines, and it is > well suited for the GREASE code points. > > But, it makes for a fairly terrible user interface for the human > operator. Compare: > > * managesieve > * 6d616e61

Re: [TLS] Possible TLS 1.3 erratum

2021-07-15 Thread Nick Harper
Regarding > so where 1.2 uses { hash, sig } 1.3 uses values equivalent to { sig, hash }. While some TLS 1.3 SignatureScheme enum values might appear to have the sig in the upper octet and hash in the lower octet, that is not the case and SignatureSchemes for TLS 1.3 only exist as combinations with

Re: [TLS] RFC8446 backward compatibility question

2021-08-05 Thread Nick Harper
Yes, backward compatibility is optional. On Thu, Aug 5, 2021 at 1:44 PM Toerless Eckert wrote: > I am trying to figure out if every implementation compliant with > RFC8446 is also necessarily interoperable with an RFC5246 peer, or if this > is just a likely common, but still completely optional

Re: [TLS] Servers respond with BadRecordMac after ClientFinished, sent when PSK+EarlyData

2022-08-09 Thread Nick Harper
That is not the expected behavior. Likely what is happening is the server (at the http layer) sees the Connection: close header, and goes to close the socket for the underlying transport (in this case, the tls stack). The server’s tls stack, when getting that signal, closes the tls connection, and

Re: [TLS] Securely disabling ECH

2022-10-18 Thread Nick Harper
On Tue, Oct 18, 2022 at 8:56 PM Safe Browsing wrote: > The draft does consider this by allowing ECH to be disabled - as discussed > in this thread. Albeit at the cost of an extra round trip. However, the > connection retry logic in the presence of ECH disabling is currently > optional. > > The dr

Re: [TLS] Securely disabling ECH

2022-10-19 Thread Nick Harper
ertificate valid for the public name, > the client can safely retry with updated settings, as described in Section > 6.1.6 > <https://www.ietf.org/archive/id/draft-ietf-tls-esni-15.html#rejected-ech> > ." > > So it simply refers back to Section 6.1.6 again, which then gets

Re: [TLS] TLS 1.3 servers and psk_key_exchange_modes == [psk_ke]?

2023-03-06 Thread Nick Harper
On Mon, Mar 6, 2023 at 9:30 PM Viktor Dukhovni wrote: > On 6 Mar 2023, at 8:13 pm, Peter Gutmann > wrote: > > > Not really sure how to fix this, although at the moment "stay with TLS > > classic" seems to be the preferred option. > > There are three stages of fixes: > > 1. Update the protocol sp

Re: [TLS] TLS 1.3 servers and psk_key_exchange_modes == [psk_ke]?

2023-03-07 Thread Nick Harper
On Tue, Mar 7, 2023 at 6:50 AM Viktor Dukhovni wrote: > On Mon, Mar 06, 2023 at 11:18:50PM -0800, Nick Harper wrote: > > > > Basically, one way or another, PSK key exchange mode negotiation needs > > > to be interoperable by default. > > > > Based on your fi

Re: [TLS] TLS 1.3 servers and psk_key_exchange_modes == [psk_ke]?

2023-03-07 Thread Nick Harper
On Tue, Mar 7, 2023 at 6:51 PM Viktor Dukhovni wrote: > What specific changes would you recommend in say the OpenSSL > implementation? Just not sending the useless tickets? Fine, we've > saved a bit of bandwidth, but haven't really solved the problem. > I don't know the details of the OpenSSL

Re: [TLS] IANA Considerations for draft-ietf-tls-dtls-connection-id

2019-06-26 Thread Nick Harper
I have a slight preference for 3. On Wed, Jun 26, 2019 at 10:35 AM Salz, Rich wrote: > Something should be done, I don't have a strong preference for 2 or 3. > Having this info back then might have prevented Heartbleed. > > ___ > TLS mailing list > TLS

Re: [TLS] consensus call: (not precluding ticket request evolution)

2020-03-04 Thread Nick Harper
On Wed, Mar 4, 2020 at 5:27 PM Viktor Dukhovni wrote: > On Wed, Mar 04, 2020 at 05:19:02PM -0800, Nick Harper wrote: > > > > Breaking interoperability. > > > > This doesn't break interoperability. If both endpoints negotiate > > ticketrequests and this new

Re: [TLS] Earlier exporters

2016-10-07 Thread Nick Harper
> > -Ekr > > On Fri, Oct 7, 2016 at 1:59 PM, Nick Harper wrote: > >> Does the wording of this PR mean that the value from the exporter changes >> depending on whether it's run before or after exporter_secret can be >> computed? I think it would be better to

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-11-17 Thread Nick Harper
I prefer TLS 1.3 but am also fine with TLS 4. On Fri, Nov 18, 2016 at 11:12 AM, Sean Turner wrote: > At IETF 97, the chairs lead a discussion to resolve whether the WG should > rebrand TLS1.3 to something else. Slides can be found @ > https://www.ietf.org/proceedings/97/slides/slides- > 97-tls-

Re: [TLS] PR#812: End Of Early Data as handshake

2016-12-12 Thread Nick Harper
On Mon, Dec 12, 2016 at 5:32 PM, Eric Rescorla wrote: > > > On Mon, Dec 12, 2016 at 5:23 PM, Martin Thomson > wrote: > >> On 13 December 2016 at 12:09, Eric Rescorla wrote: >> > David Benjamin pointed out to me that end_of_early_data is the only >> place >> > where we transition keys on an aler

[TLS]Re: WG Adoption for TLS Trust Expressions

2024-05-21 Thread Nick Harper
On Mon, May 20, 2024 at 7:26 AM Dennis Jackson wrote: > Compared to the alternatives, Trust Expressions seems to solve the > problems less effectively and introduce much greater risks. If you really > feel the opposite is true, I would strongly encourage you to: > b) Make a good faith attempt to

[TLS]Re: WG Adoption for TLS Trust Expressions

2024-05-21 Thread Nick Harper
easier to adopt and > deploy any new CA regardless of trust, rather than a system that makes > it easier to deploy & adopt any new *trusted* CA. I disagree that it makes it easier to adopt and deploy a new CA *regardless of trust*. Trust Expressions only makes it easier to deploy a CA that i

[TLS]Re: WG Adoption for TLS Trust Expressions

2024-05-24 Thread Nick Harper
On Thu, May 23, 2024 at 4:14 AM Dennis Jackson wrote: > Hi Nick, > > I think the issues around risk have a great deal of nuance that you're not > appreciating, but which I've tried to lay out below. I appreciate that > rational reasonable people can absolutely disagree on how they weigh up > thes

[TLS]TLS Trust Expressions risks

2024-05-24 Thread Nick Harper
On Fri, May 24, 2024 at 10:14 AM Dennis Jackson wrote: > Hi David, > > The certification chains issued to the server by the CA comes tagged with > a list of trust stores its included in. The named trust stores are > completely opaque to the server. These chains and names may not be trusted > by a

[TLS]Re: TLS Trust Expressions risks

2024-05-24 Thread Nick Harper
On Fri, May 24, 2024 at 2:27 PM Brendan McMillion < brendanmcmill...@gmail.com> wrote: > In your latest message [5], I understand the context of governments >> pushing for inclusion of certain roots with varying degrees of legitimacy. >> I don’t see the on-ramp for CA pre-distribution being meanin

[TLS]Re: TLS Trust Expressions risks

2024-05-24 Thread Nick Harper
On Fri, May 24, 2024 at 4:15 PM Brendan McMillion < brendanmcmill...@gmail.com> wrote: > The part of the spec you quoted says: if multiple certs match, choose any. > When TE is rendered in actual code, why do you assume that there will be no > configurable or easily-gameable way to make sure the g

[TLS]Re: Curve-popularity data?

2024-06-03 Thread Nick Harper
On Mon, Jun 3, 2024 at 3:02 PM Peter Gutmann wrote: > Filippo Valsorda writes: > > >The most important performance consideration in TLS is avoiding Hello > Retry > >Request round-trips due to the server supporting none of the client's key > >shares. > > This is already a huge problem with Chrome

[TLS]Re: HRR support (was something else)

2024-06-06 Thread Nick Harper
On Wed, Jun 5, 2024 at 6:25 AM Peter Gutmann wrote: > Martin Thomson writes: > > >Are you saying that there are TLS 1.3 implementations out there that don't > >send HRR when they should? > > There are embedded TLS 1.3 implementations [*] that, presumably for space/ > complexity reasons and possi

[TLS]Re: TLS trust expressions and certificate_authorities

2024-06-11 Thread Nick Harper
On Tue, Jun 11, 2024 at 3:25 AM Dennis Jackson wrote: > I think the above captures the main thrust of your argument in this > thread, but it seems like quite a flawed analysis. If T.E. does not offer > any new capabilities over certificate_authorities, then there is no point > in standardizing it

[TLS]Re: TLS trust expressions and certificate_authorities

2024-06-12 Thread Nick Harper
On Wed, Jun 12, 2024 at 3:17 AM Dennis Jackson wrote: > You can't argue that T.E. contains the functionality of > certificate_authorities as a subset, then conclude that having additional > functionalities makes it less risky. You would need to argue the exact > opposite, that T.E. doesn't contai

[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks

2024-07-19 Thread Nick Harper
The scenario where more than one party has the private keys is described in scenario 6 [1]. The analysis of that scenario is that trust anchor negotiation has no effect on the surveillant's ability to carry out their goals. 1: https://github.com/davidben/tls-trust-expressions/blob/main/surveillanc

[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks

2024-07-19 Thread Nick Harper
On Fri, Jul 19, 2024 at 8:58 PM Salz, Rich wrote: > >- I've read it before. I the main issue is that it says "trusted" a >lot. > > > > Yeah, kinda snippy but not necessarily wrong. > > > > I’m a little skeptical of approaches that solve an entire problem space > with one architecture. I’m

[TLS] Re: Adoption call for TLS 1.2 Update for Long-term Support

2024-11-05 Thread Nick Harper
I understand the stated goal of this draft to be to provide a way for hard-to-update endpoints to keep using TLS 1.2 in a secure way. The idea of a document that describes how to safely deploy TLS 1.2 sounds like a good idea, e.g. "use only these cipher suites, require EMS and RI, etc". This draft

[TLS] Re: Trust Anchor IDs and PQ

2025-02-04 Thread Nick Harper
On Sat, Feb 1, 2025 at 10:02 AM Eric Rescorla wrote: > Starting a new thread to keep it off the adoption call thread. > > I'm still forming my opinion on this topic. To that end, perhaps it's > most useful to focus in on the post-quantum case, as I think that's > the one that the WG finds most co

[TLS] Re: Adoption Call for Trust Anchor IDs

2025-02-05 Thread Nick Harper
It is silly that in today’s world, we consider it good enough that a server can send a client an end entity cert and a grab bag of intermediates and cross signs and tell the client “I hope there’s enough material here for you to build a path to something that you trust”. If someone proposed a new s