On 10/25/2017 06:29 PM, Eric Rescorla wrote:



    dh-group           = ALPHA *(ALPHA / DIGIT / "_")


I might want to include hyphen here because "P-256"

done.

        Line 405
            implementation does not know the name of the cipher suite (a
            situation that should be remedied promptly), a four-digit
        hexadecimal
            cipher suite identifier MAY be used.  The ABNF for the
        field follows:
        Hard to see how you could realistically get into this state...

    Chris wrote this so this is just a guess on my part:   I'm
    assuming there are TLS APIs out there that let the caller query
    which ciphersuite is being used, but the implementation returns an
    integer rather than the name, and provides no convenience routine
    to look up the name text.


OK. Chris?



        Line 594
            accounts SHOULD be at least use of TLS version 1.1 or
        greater, and
            successful validation of the server's certificate. 
        (Future revisions
            to this specification may raise these requirements or impose
        This second requirement is more important.


    Agree, or at least I think I do (are MiTM attacks taking advantage
    of no or weak cert validation really more of a threat than attacks
on TLS < 1.1 protocol or ciphersuites?  yeah, I could see that.).

No, they're not.

    But I certainly want implementors to pay more attention to cert
    validation.

    I'm not sure what change to the text you had in mind, but I
    reversed the order to put cert validation first.


I think that success validation needs to be a MUST.

Ah, now I understand.  Changed to MUST validate + SHOULD TLS >= 1.1.


        Line 781
            or interception; this is not intended to mitigate active
        attackers
            who have compromised service provider systems.
        IMPORTANT: Client auth with TLS 1.2 reveals the user's
        identity. This is a
        privacy issue, and so we need to note it. The options here are
        not great with <
        1.3 because renegotiation is also bad, so I'm not suggesting a
        normative
        change, but I think the doc needs to be clear.


    Added a paragraph:

    Implementors should be aware that use of client certificates with TLS
    1.2 likely reveals the user's identity to the server and therefore may
    compromise the user's privacy.  There seems to be no easy fix other
    than to avoid presenting client certificates except when specifically
    configured to do so.


The issue here is that it exposes it not to the  server (though it does) but to anyone on the
wire. This is actually better with TLS 1.3.

ok, clarified the paragraph that I wrote.

Keith


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to