Hiya,

On 18/05/2023 05:43, John Mattsson wrote:
I think IETF should state in the LS that:

The IETF maintains copyright and change control for TLS
specifications. Having a separate, different, protocol named "TLS"
but developed by another SDO is a recipe for confusion among
developers, implementers, and users alike.

I'm not sure that the copyright issue really comes up
wrt this NIST activity - seems more likely NIST would
issue some report on "NIST's ideas for HOWTO do TLS
badly" rather than try define a borked version of TLS
a la ETSI. (I'd also guess that even people who want
to weaken TLS would learn lessons from others failed
attempts;-)

Reuse of key shares
violate the design and operational assumptions of TLS 1.3

The above is the key point yes. I do think there's
value in having something to point imeplementers at
that says the IETF don't agree with NIST's bad ideas
here.

and render
this NIST profile as a qualitatively different protocol that should
be named accordingly. We therefore formally request that NIST alter
the name of its work on a protocol with key share reuse so that
implementors, users, and governments are not confused about its
properties or the properties of TLS.

Again, not sure thinking about this in terms of a
different "weaker NIST-version of TLS" is likely the
best way to try get them to see sense. In this case
it may be better to point at MUSTs or SHOULDs or
other RFC text they're asking be violated.

Cheers,
S.

PS: FWIW, mostly unrelated, but this NIST activity (and
I guess the dual-ec debacle) makes at least me somewhat
less keen on just accepting NIST's choices for PQ things.
If that applied to others, it may become relevant (in
terms of the ease of achieving consensus) when we get to
which hybrid stuff to standardise for TLS in the not too
distant future.


Where the above text is more or less copy pasted from the LSs to
ETSI.

Cheers, John


On 2023-05-17, 20:43, "Stephen Farrell" <stephen.farr...@cs.tcd.ie>
wrote:

Hiya,

On 17/05/2023 18:49, John Mattsson wrote:
Hi,

Should IETF / SEC / TLS send an LS to NIST as was done with
ESTI-TC-CYBER?

Yes. Other relevant bodies defining ways to weaken the hard-won
security of IETF protocols really ought always be (nicely) told
they're doing a bad thing.

I sent NIST my own comments (also with an attempt at "nicely":-) and
would encourage others to do similarly, even though it's not that
likely they'll take much notice I suspect (on the basis that they
even started this IMO bad-idea-factory activity).

Cheers, S.


https://datatracker.ietf.org/liaison/1538/ https://datatracker.ietf.org/liaison/1616/

A lot of the comments in the LSs to ESTI-TC-CYBER also apply to the
NIST work.

"Our foremost concern is the use of the name Transport Layer
Security (TLS), a well-known protocol which has been developed by
the IETF for over twenty years. The IETF maintains copyright and
change control for TLS specifications. Having a separate,
different, protocol named "TLS" but developed by another SDO is a
recipe for confusion among developers, implementers, and users
alike."

"The IETF remains strongly committed to fostering end-to-end
security, and the properties of TLS enable that for key IETF
protocols. We believe the ETSI work to proceed from a different
design goal: to enable third-party monitoring. Because applications
using TLS expect its end-to-end security properties, the re-use of
the name will create misunderstandings. We therefore formally
request that ETSI alter the name of its work enabling third-party
monitoring so that implementors, users, and governments are not
confused about its properties or the properties of TLS."

"the main area of divergence from TLS 1.3 to this MSP profile is
the replacement of the server’s "ephemeral" DH key with a "static"
DH key, which suffices to violate the design and operational
assumptions of TLS 1.3 and render this MSP profile as a
qualitatively different protocol that should be named
accordingly."

My feeling is that the IETF community is much more against reuse of
key shares now than in 2017. At IETF 116 there seemed to be
consensus to discourage psk_ke. RFC8446bis and RFC9325 now have
strong normative text discouraging key share reuse.

I personally think it is problematic and not very constructive if
IETF states that all visibility solutions are bad. It would in my
view be more pragmatic to state that some technical solutions are
better than other.

Cheers, John

From: TLS <tls-boun...@ietf.org<mailto:tls-boun...@ietf.org>> on
behalf of John Mattsson
<john.mattsson=40ericsson....@dmarc.ietf.org<mailto:40ericsson....@dmarc.ietf.org>>


Date: Tuesday, 16 May 2023 at 15:59
To: Salz, Rich
<rsalz=40akamai....@dmarc.ietf.org<mailto:40akamai....@dmarc.ietf.org>>,
tls@ietf.org<mailto:tls@ietf.org>
<tls@ietf.org<mailto:tls@ietf.org>> Subject: Re: [TLS] NIST Draft
comments period: Addressing Visibility Challenges with TLS 1.3 Hi
Rich,

Good that you inform the TLS WG. I was planning to do that but
forgot. Ericsson is likely to provide the comments in the link
below. We think it is good that NIST is doing this project,
visibility is a problem, but our position is that reuse of key
shares is not an acceptable solution.

https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-0709a0af3bfcfd71&q=1&e=572ebc85-77e0-4e77-bfd3-3dc82a21c3bf&u=https%3A%2F%2Fgithub.com%2Femanjon%2FPublications%2Fblob%2Fmain%2FEricsson%2520comments%2520on%2520NIST%2520SP%25201800-37A%2520May%252013.pdf<https://protect2.fireeye.com/v1/url?k=31323334-501cfaf3-313273af-454445554331-7d2441a08db5bc25&q=1&e=aaabd95a-d6a9-4af8-9292-dd48d0908491&u=https%3A%2F%2Fgithub.com%2Femanjon%2FPublications%2Fblob%2Fmain%2FEricsson%2520comments%2520on%2520NIST%2520SP%25201800-37A%2520May%252013.pdf><https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-0709a0af3bfcfd71&q=1&e=572ebc85-77e0-4e77-bfd3-3dc82a21c3bf&u=https%3A%2F%2Fgithub.com%2Femanjon%2FPublications%2Fblob%2Fmain%2FEricsson%2520comments%2520on%2520NIST%2520SP%25201800-37A%2520May%252013.pdf%3chttps://protect2.fireeye.com/v1/url?k=31323334-501cfaf3-313273af-454445554331-7d2441a08db5bc25&q=1&e=aaabd95a-d6a9-4af8-9292-dd48d0908491&u=https%3A%2F%2Fgithub.com%2Femanjon%2FPublications%2Fblob%2Fmain%2FEricsson%2520comments%2520on%2520NIST%2520SP%25201800-37A%2520May%252013.pdf%3e>



Cheers,
John


From: TLS <tls-boun...@ietf.org<mailto:tls-boun...@ietf.org>> on
behalf of Salz, Rich
<rsalz=40akamai....@dmarc.ietf.org<mailto:40akamai....@dmarc.ietf.org>>


Date: Tuesday, 16 May 2023 at 13:19
To: tls@ietf.org<mailto:tls@ietf.org>
<tls@ietf.org<mailto:tls@ietf.org>> Subject: [TLS] NIST Draft
comments period: Addressing Visibility Challenges with TLS 1.3 Public comment period open until June 26.

Quoting from
https://content.govdelivery.com/accounts/USNIST/bulletins/359534b

This project builds on our earlier work,
“https://www.nccoe.nist.gov/tls-server-certificate-management,”
which showed organizations how to centrally monitor and manage
their TLS certificates. We are now focusing on protocol
enhancements such as TLS 1.3 which have helped organizations boost
performance and address security concerns. These same enhancements
have also reduced enterprise visibility into internal traffic flows
within the organizations' environment. This project aims to change
that--and has two main objectives: • Provide security and IT
professionals practical approaches and tools to help them gain more
visibility into the information being exchanged on their
organizations’ servers. • Help users fully adopt TLS 1.3 in their
private data centers and in hybrid cloud environments—while
maintaining regulatory compliance, security, and operations.


_______________________________________________ TLS mailing list TLS@ietf.org<mailto:TLS@ietf.org> https://www.ietf.org/mailman/listinfo/tls


_______________________________________________ TLS mailing list TLS@ietf.org<mailto:TLS@ietf.org> https://www.ietf.org/mailman/listinfo/tls


Attachment: OpenPGP_0xE4D8E9F997A833DD.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to