Note that this is different from Token Binding because that's negotiated by
an extension, so per S 9.3, non-supporting middleboxes need to strip out
the extension

-Ekr


On Mon, May 7, 2018 at 8:06 AM, Roelof duToit <r@nerd.ninja> wrote:

>
> > On May 4, 2018, at 5:48 PM, Benjamin Kaduk <bka...@akamai.com> wrote:
> >
> > On Fri, May 04, 2018 at 11:20:55AM -0400, Roelof duToit wrote:
> >> How will this (and any mechanism built on top of RFC 5705 exported key
> material) interoperate with middleboxes?  This use of the mechanism is not
> negotiated on the TLS level, so there is no extension for the middlebox to
> strip that would warn the endpoints not to use exported authenticators.
> Are application level proxies the only compatible middleboxes?
> >
> > I'm not sure I properly understand the question, in particular what kind
> of
> > middlebox you're considering.  Note that application protocols will need
> to
> > have some way to negotiate the use of this functionality, which
> presumably a
> > middlebox could also inspect.
>
>
> That is the problem.. some middleboxes are protocol agnostic and are used
> to strip the TLS layer before feeding the rest of the security stack - so
> called “Transport Layer Active Intercept” vs “Application Layer Intercept”
> (ignoring “Transport Layer Passive Intercept” for the moment).  Some
> middleboxes might also perform transport layer active intercept in
> combination with passive application detection, i.e. L7 analysis vs L7
> termination.
> In summary: the endpoints cannot assume that exported key material is
> identical in a middlebox environment.
>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to