Re: [TLS] analysis of wider impact of TLS1.3 replayabe data

2016-03-13 Thread Scott Schmit
ecause "if it was so insecure, they wouldn't have included it in the protocol in the first place." Unless 0-RTT can be fixed, it looks like an attractive nuisance. Let's leave it out. -- Scott Schmit smime.p7s Description: S/MIME cryptographic signature ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-11-22 Thread Scott Schmit
rly easy to translate to "the new version of TLS is going to really improve things". The distinction between 2 vs 2.0 seems pretty minor. SSLv2 is 2.0 and SSLv3 is 3.0, but few write it that way. Thus my ranked preference would be: TLS 2017 > TLS 4 > TLS 1.3 > TLS 2 or TLS 2.0

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-12-02 Thread Scott Schmit
ange at any time." Anyone doing otherwise is arguably as confused as those who don't even know what TLS is. And there are a lot more of the latter than the former. But no, I would not support calling the next TLS version "SSL 4/2017" -- the harm of invalidating the

Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-12-02 Thread Scott Schmit
SSL versions as to be confused with them. And the shift in versioning strategy is so typical it would probably not even draw serious notice. -- Scott Schmit smime.p7s Description: S/MIME cryptographic signature ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] Requiring that (EC)DHE public values be fresh

2016-12-31 Thread Scott Schmit
ecurity by one iota. If we add an alert to be sent in this case, it would be possible for the server to know why the clients were disconnecting and resolve the issue. -- Scott Schmit ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls