On Fri, Feb 19, 2016 at 11:25 AM, Watson Ladd <watsonbl...@gmail.com> wrote:

> Cf 6.3.4.2. Certificate Verify with 6.3.5.1.  New Session Ticket Message
>
> and we see that client certificate verification is allowed for some
> PSK exchanges and not others, and that the PSK exchanges used in
> resumption are ones where it is allowed. (Maybe I am reading that
> wrong) Right now this feels footgunny to me: you have to track where
> the PSK came from to decide if client auth is allowed.
>

I suspect we actually can relax this constraint and instead have
a clear warning about the impact of sharing PSKs.

-Ekr


I'd like to see an explicit separation by indicating where the PSK
> came from in the ciphersuite, and then implementations reject
> authentication with one of them. This way someone who wants to do the
> wrong thing is at least forced through enough contortions they will
> notice, rather than seeing two features that seem to work together but
> don't.
>
> TRON is in 2 days, and I'm concerned that the degree of analysis of
> TLS 1.3 is far below where I would like to see with the timelines some
> people are pushing for. I think it's clear that TLS 1.3
> implementations will never be as secure and as simple as QUIC or
> CurveCP. At the same time we've diverged from TLS 1.2 enough that
> implementations will be significantly complicated when supporting
> both, the reason given for not massively simplifying the protocol in
> the first place.
>
> Sincerely,
> Watson
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to