Hi everyone,

This draft extends TLS 1.3 to provide pinning of the TLS server using a
stateless ticket. This is similar to public-key pinning but not quite,
and our goal was to overcome the deployment issues that prevent
widespread deployment of HPKP.

Version -02 of the draft incorporates learnings from my proof-of-concept
implementation at https://github.com/yaronf/mint. Thanks to the authors
on the Mint TLS 1.3 implementation from which my code was forked.

Best,
        Yaron

-------- Forwarded Message --------
Subject: New Version Notification for
draft-sheffer-tls-pinning-ticket-02.txt
Date: Fri, 08 Jul 2016 06:42:25 -0700
From: internet-dra...@ietf.org
To: Yaron Sheffer <yaronf.i...@gmail.com>


A new version of I-D, draft-sheffer-tls-pinning-ticket-02.txt
has been successfully submitted by Yaron Sheffer and posted to the
IETF repository.

Name:           draft-sheffer-tls-pinning-ticket
Revision:       02
Title:          TLS Server Identity Pinning with Tickets
Document date:  2016-07-08
Group:          Individual Submission
Pages:          18
URL:
https://www.ietf.org/internet-drafts/draft-sheffer-tls-pinning-ticket-02.txt
Status:
https://datatracker.ietf.org/doc/draft-sheffer-tls-pinning-ticket/
Htmlized:
https://tools.ietf.org/html/draft-sheffer-tls-pinning-ticket-02
Diff:
https://www.ietf.org/rfcdiff?url2=draft-sheffer-tls-pinning-ticket-02

Abstract:
   Fake public-key certificates are an ongoing problem for users of TLS.
   Several solutions have been proposed, but none is currently in wide
   use.  This document proposes to extend TLS with opaque tickets,
   similar to those being used for TLS session resumption, as a way to
   pin the server's identity.  That is, to ensure the client that it is
   connecting to the right server even in the presence of corrupt
   certificate authorities and fake certificates.  The main advantage of
   this solution is that no manual management actions are required.





Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat



_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to