Mike just inadvertently (?) discovered a problem with exported
authenticators.

TLS post handshake authentication provides an authenticated refusal when a
certificate can't be found.  It turns out that the current design of the
HTTP/2 CERTIFICATE frame might need to rely on the same capability here.

The current draft doesn't really say anything about what happens.

https://github.com/tlswg/tls-exported-authenticator/issues/25

On Sat, May 12, 2018 at 9:59 AM Nick Sullivan <nicholas.sulli...@gmail.com>
wrote:

> Thanks all for the comments on the draft. Let me try to summarize the
comments and propose next steps.

> Tim Hollebeek had a comment about 0 as the separator. I generally don’t
think this is a big issue, and prefer 0 because it is a natural way to
terminate a string. If anyone strongly disagrees, please reply to the list.

> Roelof duToit raised a question about middlebox interoperability,
specifically that the exporters will not match if the TLS connection is not
end-to-end. There was a subsequent discussion about where to signal this
property. Martin Thomson suggested a signaling mechanism at the application
layer (https://github.com/httpwg/http-extensions/issues/617) and Eric
Rescorla suggested that the fact that this could cause CertificateVerify
failures should be called out in the document. I'll put a PR together to
add some helpful text around debugging CertificateVerify failures to
address Eric's suggestion.

> Ben Kaduk had three points:
> - The certificate_request_context is prone to collisions with
post-handshake authentication and there are different spaces for the server
and client context values. He suggested some text in Section 3 and maybe
more explanation in Section 5.2 as well. I’ll put together a PR for this.
> - Section 4.1 talks of the length of the exporter value in terms of the
length of the
> TLS PRF hash, adding that cipher suites not using TLS PRF have to define
a hash function, but TLS 1.3 ciphersuites do not use the TLS PRF. I’ll put
together a PR to clarify the text around this clarifying that for TLS 1.3
cipher suites, the HDKF hash is what is meant.
> - The “signature_algorithms_cert” extension was not incorporated into the
draft. I’ll put together a PR for 4.2.1., 4.2.2. and 5.1. to incorporate
this extension.

> I'll have the proposed changes for the above comments ready next week.

> There were also some uncontroversial suggestions that I propose merging:
> https://github.com/tlswg/tls-exported-authenticator/pull/21
> https://github.com/tlswg/tls-exported-authenticator/pull/22
> https://github.com/tlswg/tls-exported-authenticator/pull/23
> https://github.com/tlswg/tls-exported-authenticator/pull/24


> Nick


> On Thu, May 3, 2018 at 1:16 PM Nick Sullivan <nicholas.sulli...@gmail.com>
wrote:

>> Does anyone have any comments about the draft, criticisms, or votes of
support?

>> Nick


>> On Thu, May 3, 2018 at 1:12 PM Sean Turner <s...@sn3rd.com> wrote:



>>> > On Apr 21, 2018, at 10:25, Sean Turner <s...@sn3rd.com> wrote:
>>> >
>>> >
>>> >> On Apr 19, 2018, at 16:32, Sean Turner <s...@sn3rd.com> wrote:
>>> >>
>>> >> All,
>>> >>
>>> >> This is the working group last call for the "Exported Authenticators
in TLS" draft available at
https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/.
Please review the document and send your comments to the list by 2359 UTC
on 4 April 2018.
>>> >
>>> > … 4 May 2018 ...

>>> Just a reminder the WGLC ends tomorrow.

>>> spt
>>> _______________________________________________
>>> TLS mailing list
>>> TLS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tls

> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to