> On May 4, 2018, at 5:48 PM, Benjamin Kaduk <bka...@akamai.com> wrote: > > On Fri, May 04, 2018 at 11:20:55AM -0400, Roelof duToit wrote: >> How will this (and any mechanism built on top of RFC 5705 exported key >> material) interoperate with middleboxes? This use of the mechanism is not >> negotiated on the TLS level, so there is no extension for the middlebox to >> strip that would warn the endpoints not to use exported authenticators. Are >> application level proxies the only compatible middleboxes? > > I'm not sure I properly understand the question, in particular what kind of > middlebox you're considering. Note that application protocols will need to > have some way to negotiate the use of this functionality, which presumably a > middlebox could also inspect.
That is the problem.. some middleboxes are protocol agnostic and are used to strip the TLS layer before feeding the rest of the security stack - so called “Transport Layer Active Intercept” vs “Application Layer Intercept” (ignoring “Transport Layer Passive Intercept” for the moment). Some middleboxes might also perform transport layer active intercept in combination with passive application detection, i.e. L7 analysis vs L7 termination. In summary: the endpoints cannot assume that exported key material is identical in a middlebox environment. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls