I understand that there is not really anything to negotiate per se, but would 
it not be prudent to add a TLS extension to negotiate support for 
exported-authenticator in the TLS layer prior to using it in the application 
layer?

—Roelof

> On May 7, 2018, at 12:16 PM, Roelof duToit <r@nerd.ninja> wrote:
> 
> Agree.  Middleboxes can signal on the TLS layer that token-binding is not 
> supported, but not for exported-authenticator.
> 
>> On May 7, 2018, at 12:06 PM, Eric Rescorla <e...@rtfm.com 
>> <mailto:e...@rtfm.com>> wrote:
>> 
>> Note that this is different from Token Binding because that's negotiated by 
>> an extension, so per S 9.3, non-supporting middleboxes need to strip out the 
>> extension
>> 
>> -Ekr
>> 
>> 
>> On Mon, May 7, 2018 at 8:06 AM, Roelof duToit <r@nerd.ninja 
>> <mailto:r@nerd.ninja>> wrote:
>> 
>> > On May 4, 2018, at 5:48 PM, Benjamin Kaduk <bka...@akamai.com 
>> > <mailto:bka...@akamai.com>> wrote:
>> > 
>> > On Fri, May 04, 2018 at 11:20:55AM -0400, Roelof duToit wrote:
>> >> How will this (and any mechanism built on top of RFC 5705 exported key 
>> >> material) interoperate with middleboxes?  This use of the mechanism is 
>> >> not negotiated on the TLS level, so there is no extension for the 
>> >> middlebox to strip that would warn the endpoints not to use exported 
>> >> authenticators.  Are application level proxies the only compatible 
>> >> middleboxes?
>> > 
>> > I'm not sure I properly understand the question, in particular what kind of
>> > middlebox you're considering.  Note that application protocols will need to
>> > have some way to negotiate the use of this functionality, which presumably 
>> > a
>> > middlebox could also inspect.
>> 
>> 
>> That is the problem.. some middleboxes are protocol agnostic and are used to 
>> strip the TLS layer before feeding the rest of the security stack - so 
>> called “Transport Layer Active Intercept” vs “Application Layer Intercept” 
>> (ignoring “Transport Layer Passive Intercept” for the moment).  Some 
>> middleboxes might also perform transport layer active intercept in 
>> combination with passive application detection, i.e. L7 analysis vs L7 
>> termination.
>> In summary: the endpoints cannot assume that exported key material is 
>> identical in a middlebox environment.
>> 
>> 
>> 
>> _______________________________________________
>> TLS mailing list
>> TLS@ietf.org <mailto:TLS@ietf.org>
>> https://www.ietf.org/mailman/listinfo/tls 
>> <https://www.ietf.org/mailman/listinfo/tls>
>> 
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to