> On Nov 8, 2018, at 4:34 AM, Salz, Rich <rs...@akamai.com> wrote:
> 
> What makes you say that?  Please be specific about what you think should be 
> taken out.

One example area where the complexity is noticeably high:

 * Certificate selection metadata specificity seems to far exceed
   plausible diversity of choice on the peer end.  Are there
   really clients or servers out there with so many different
   certificates to choose from that we need:

        a.  CA name hints from client to server?
        b.  OID filters in the certificate request from server to client?
        c.  signature_algorithms_cert (TLS -> X.509 layer violation, I
            just ignore this one)?

    In TLS 1.2 the signature_algorithms extension needs to be combined
    with the certificate types list, and neither 5246 or 4492 provides
    a means for the client to decide which curves the server supports
    in the client certificate (addressed in TLS 1.3).

TLS 1.2 has fixed-(EC)DH ciphersuites that should probably never have
been defined, and for some unknown reason added MD5 as a valid signature
algorithm hash, even though MD5 had already reached its use-by date...

For simplicity, I am a fan of Mike Hamburg's STROBE (a protocol design
framework, not a finished protocol):

   https://eprint.iacr.org/2017/003

of course one still needs to plug in some sort of PKI to get
a complete system, but it robustly unifies many things that in
TLS need to be built with one's bare hands.  I do hope that
STROBE is getting used somewhere, and not just languishing as
a paper design.

-- 
-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to