Hi Viktor,

Are point compressed secp256r1 RPKs supported?

- Uncompressed secp256r1 RPKs are 91 bytes.
- Point compressed secp256r1 RPKs are 59 bytes
- Ed25519 RPKs are 58 bytes

Cheers,
John

From: TLS <tls-boun...@ietf.org> on behalf of Achim Kraus <achimkr...@gmx.net>
Date: Sunday, 22 January 2023 at 22:02
To: tls@ietf.org <tls@ietf.org>, Viktor Dukhovni <ietf-d...@dukhovni.org>
Subject: Re: [TLS] FYI, RFC7250 (raw public keys) to be supported in OpenSSL 
~3.2
Hello Viktor,

 > Thanks to Todd Short, RFC7250 raw public keys should be available in
 > OpenSSL ~3.2.  Applications that use unauthenticated opportunistic TLS,

Sounds great. Especially for IoT/constraint use-cases that's a real
benefit.

Just in the case, someone is interested, I asked a couple of months ago,
if https://datatracker.ietf.org/doc/html/draft-ietf-tls-subcerts-10 has
some considerations about certificate types without a validation date.
See 
https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-1d6e8c010f9a9db6&q=1&e=45adec37-94c0-453e-b42c-80479cc77e30&u=https%3A%2F%2Fgithub.com%2Ftlswg%2Ftls-subcerts%2Fissues%2F107

 > The pull request 
 > <https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-66e352cf1acf4bf8&q=1&e=45adec37-94c0-453e-b42c-80479cc77e30&u=https%3A%2F%2Fgithub.com%2Fopenssl%2Fopenssl%2Fpull%2F18185>
 >  is
 > still a work in progress, but complete enough for application
 > integration testing.

I will try to test next week the DTLS interoperability with

Eclipse/tinydtls
Eclipse/Californium

best regards
Achim


Am 22.01.23 um 21:41 schrieb Viktor Dukhovni:
> Thanks to Todd Short, RFC7250 raw public keys should be available in
> OpenSSL ~3.2.  Applications that use unauthenticated opportunistic TLS,
> employ DANE or have other ways to avoid X.509 certificates and make do
> with raw peer public keys can avoid the overhead of receiving and
> processing certificate chains.
>
> The pull request 
> <https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-66e352cf1acf4bf8&q=1&e=45adec37-94c0-453e-b42c-80479cc77e30&u=https%3A%2F%2Fgithub.com%2Fopenssl%2Fopenssl%2Fpull%2F18185>
>  is
> still a work in progress, but complete enough for application
> integration testing.  Likely too late for OpenSSL 3.1 (in beta now), but
> seems likely to land by 3.2.  The TODO items on the OpenSSL side are
> at this point IMHO minor.  Review eyeballs of course always appreciated.
>
> I have a Postfix branch with a reasonably complete implementation:
>
>      # posttls-finger -c <domain>
>      posttls-finger: <mxhost>[192.0.2.1]:25: raw public key fingerprint=<...>
>      posttls-finger: <mxhost>[192.0.2.1]:25: Matched DANE raw public key: 3 1 
> 1 <...>
>      posttls-finger: Verified TLS connection established to 
> <mxhost>[192.0.2.1]:25:
>          TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
>          key-exchange X25519
>          server-signature RSA-PSS (2048 bits)
>          server-digest SHA256
>
> based on the the current state of the pull request.
>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to