From benl@google.com Thu Aug 1 04:04:33 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B3E121E8085 for ; Thu, 1 Aug 2013 04:04:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.232 X-Spam-Level: X-Spam-Status: No, score=-1.232 tagged_above=-999 required=5 tests=[AWL=-0.744, BAYES_05=-1.11, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id me32jZWIJpYv for ; Thu, 1 Aug 2013 04:04:32 -0700 (PDT) Received: from mail-oa0-x22a.google.com (mail-oa0-x22a.google.com [IPv6:2607:f8b0:4003:c02::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 17F1221E805F for ; Thu, 1 Aug 2013 04:04:27 -0700 (PDT) Received: by mail-oa0-f42.google.com with SMTP id i18so4040458oag.15 for ; Thu, 01 Aug 2013 04:04:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=HkB+BLCgT51H7xuszuuSXxqVVuVyOxB4bj02Q635eMs=; b=bp5PLsHqCopNF8RIwa85+fhx8eh9hCivRfyNL9xWAayHxc0blzv/pWAqGCiPiXUBvP 5NhyXIU+/pkfgN6sALMtLq/Wsf3zy38cuakmog4ULH5ytodLzrD52c/N4DGnBAoq6QSB NQjMLpl+88/x6zwaJvpIpFElM4ocJzdWHD9Z3P9M34LPdLXMvVhC/j2xTVuEtcXvL9Kl eyfwiEBD33izjUbNwoTMD9ddL5Wssq74PsionROd6uB1GO+nA2JnysphF7w+QXgK5Xcf oA1zwhu7LnujpMm6XRgQ4kqYo8wIvFsKF2hQvNaLpwO11VeEtpAwRZYaNzfOa3HxT9PS Z4Fg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type :x-gm-message-state; bh=HkB+BLCgT51H7xuszuuSXxqVVuVyOxB4bj02Q635eMs=; b=QpYTNbjI4E1g0UaDhje/VIB8jFfQ67kemwq8EVbn+ElNbkjM1O4qbWt4fqiBDJfM1y cIyQkra/J9gMNaCWmbG2THTdDGOJ9L86Pv+lpkB/ePEdo8viL1NsOVc5yPDtCACx1DbF AEQx5OZIB4B5oMQU9eED+OSLmH2WkvpvLCJ7ZdhEzbN5wPx+EMNshrA5LGP0odolI4MJ fE8a/6P7owltlodmoSLu2/LQIYa8l5DmU9RyIQdDAPdhh55Lv3WUL2pKl+958LheJFjy Rbx+txh8+ul7S+XdMC/bZendTofoB5z7N+aW45j3actbimwk/v02MyvDHZBNsE6SSeN5 8d4w== MIME-Version: 1.0 X-Received: by 10.43.57.9 with SMTP id we9mr92570icb.90.1375355066116; Thu, 01 Aug 2013 04:04:26 -0700 (PDT) Received: by 10.64.230.239 with HTTP; Thu, 1 Aug 2013 04:04:26 -0700 (PDT) Date: Thu, 1 Aug 2013 12:04:26 +0100 Message-ID: From: Ben Laurie To: "therightkey@ietf.org" , "tls@ietf.org" Content-Type: multipart/alternative; boundary=bcaec51b1b9f281a3d04e2e0cef3 X-Gm-Message-State: ALoCoQmAfL576QqtEiEZDC++Ai4JFQdELv/2oZl9OWvg7IyYUdPRDTL3uuHB4DPX+dB+TqCjSns0KtGHaTlPgBmlwrCbm0Ec+4BK3spx2incc07463amo3exLYcU+pPvHzikRs6ka6TLoueh1iBhYWp70ocbGS0aKCQVZs9Yl/ROZ9I1bZijEk95nTNxlj+zr2Yrlp2pjGp8 Subject: [TLS] Revamped CT site X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Aug 2013 11:04:33 -0000 --bcaec51b1b9f281a3d04e2e0cef3 Content-Type: text/plain; charset=ISO-8859-1 We've finally brought the CT site, http://www.certificate-transparency.org/, back up to speed. Comments welcome! --bcaec51b1b9f281a3d04e2e0cef3 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
We've finally brought the CT site,=A0http://www.certificate-transparency.org= /, back up to speed.

Comments welcome!
--bcaec51b1b9f281a3d04e2e0cef3-- From benl@google.com Thu Aug 1 09:35:00 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9567411E8123 for ; Thu, 1 Aug 2013 09:35:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.903 X-Spam-Level: X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[AWL=0.074, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C4kCHJ-QOkT6 for ; Thu, 1 Aug 2013 09:35:00 -0700 (PDT) Received: from mail-ob0-x22a.google.com (mail-ob0-x22a.google.com [IPv6:2607:f8b0:4003:c01::22a]) by ietfa.amsl.com (Postfix) with ESMTP id C4ACE11E8122 for ; Thu, 1 Aug 2013 09:34:59 -0700 (PDT) Received: by mail-ob0-f170.google.com with SMTP id eh20so4358827obb.15 for ; Thu, 01 Aug 2013 09:34:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=kty2tLlNsyRF511WN0YqR/BHaGFpdcFUEwXSSmXtjdw=; b=Msue0deUrGkQc3qJmA06KwRlNYa3Tm9x5auBLdbu99KwapZEmI2eWpdnfCAOqzXLH+ w8PWo6ErvxiRANfCg/4YegbhigT4LYiBkcWknqNPAvMFXVDcZ0DdNlhblqVJMUcazi0s txPz9KhdUH1wvZTVOt5d+1Ejg7aALTbdUA+ugX3jopPOmjBdqtfVp36uv/Rfx0gjEBob EoGDQ8Y3jYtlmHv0yUgplF13OeOvRemI8jIu4uIz2zkWzboYsL/NQmbZHvKiSvy6Zo4h ChzqUDw2gE0gJyM9vbPhWjRYnnD52lFzSVkfLidPmqF+4A/vodurBn6M4zjhcbHiFGal EcZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:x-gm-message-state; bh=kty2tLlNsyRF511WN0YqR/BHaGFpdcFUEwXSSmXtjdw=; b=J+InwJaeHmJCzi6ajujai5FCTtCwGfMwVIUy+/9ZN8swSztTWdzyq0LtKuGgQeG7bc zmWGjQhK24Z+XakbMRc791mIyIo+L55/OXvj7uVHhYzoxx4jFoxBnx7BlY+wWJHL3FNe MrpICRJImNJn9xCWBRCTAbikYcZl3tEQ4zVcjY/fnXgyP4hJQuYa8THRVJlVjTADlWYl t/bqEX0imLDQ1zzvSVPpG3L92M6gvogEDdkkHnuqWY4Xm7oCn/5GFBa64NMDhUDawZN3 uIde0FhW/YheFB+VV2LS/Fr083ko6oxsLYqU/rnz7L9Nd/xTPWDkrQkfYt/HlLbKcA4N 9WzA== MIME-Version: 1.0 X-Received: by 10.43.78.196 with SMTP id zn4mr225849icb.55.1375374899198; Thu, 01 Aug 2013 09:34:59 -0700 (PDT) Received: by 10.64.230.239 with HTTP; Thu, 1 Aug 2013 09:34:59 -0700 (PDT) In-Reply-To: <20130801162131.GT12793@nef.pbox.org> References: <20130801162131.GT12793@nef.pbox.org> Date: Thu, 1 Aug 2013 17:34:59 +0100 Message-ID: From: Ben Laurie To: Alistair Crooks Content-Type: multipart/alternative; boundary=001a11c3b8344d119f04e2e56cc7 X-Gm-Message-State: ALoCoQmOUtd8vJIx2w2VPTw6WfeNa+NUFWuOgW9nhHmHhgN56xDYg97+9T8iVNg9bVJPoBKlWhiI603ltMUpgkTSTkkSlKVVvxmegPizGfjyGd5U6kxnngiVMaONi/Dx77MNE+nJ9MEqpDXIt0J4qu/VWMECuLkGd5haipvTT91uM4izlKMCc5/yCEgZzlnP0M0aPuqoLwQb Cc: "therightkey@ietf.org" , "tls@ietf.org" Subject: Re: [TLS] [therightkey] Revamped CT site X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Aug 2013 16:35:00 -0000 --001a11c3b8344d119f04e2e56cc7 Content-Type: text/plain; charset=ISO-8859-1 On 1 August 2013 17:21, Alistair Crooks wrote: > On Thu, Aug 01, 2013 at 12:04:26PM +0100, Ben Laurie wrote: > > We've finally brought the CT > > site, [1]http://www.certificate-transparency.org/, back up to speed. > > Comments welcome! > > Dogfooding, I'd kind of expected port 443? > Fair point, though this is only info about CT, not CT itself. --001a11c3b8344d119f04e2e56cc7 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable



On 1 August 2013 17:21, Alistair Crooks <agc@pkgsrc.org> wrote:
On Thu, Aug 01, 2013 at 12= :04:26PM +0100, Ben Laurie wrote:
> =A0 =A0We've finally brought the CT
> =A0 =A0site, [1]http://www.certificate-transparency.org/, back u= p to speed.
> =A0 =A0Comments welcome!

Dogfooding, I'd kind of expected port 443?

Fair point, though this is only info about CT, not CT itself.=A0

--001a11c3b8344d119f04e2e56cc7-- From iesg-secretary@ietf.org Fri Aug 2 00:23:51 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0E9611E8279; Fri, 2 Aug 2013 00:23:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.504 X-Spam-Level: X-Spam-Status: No, score=-102.504 tagged_above=-999 required=5 tests=[AWL=0.096, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LIt5aOIsO72Z; Fri, 2 Aug 2013 00:23:51 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0567511E81E3; Fri, 2 Aug 2013 00:23:51 -0700 (PDT) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: The IESG To: IETF-Announce X-Test-IDTracker: no X-IETF-IDTracker: 4.60p1 Sender: Message-ID: <20130802072350.14846.84073.idtracker@ietfa.amsl.com> Date: Fri, 02 Aug 2013 00:23:50 -0700 Cc: tls@ietf.org Subject: [TLS] Last Call: (Out-of-Band Public Key Validation for Transport Layer Security (TLS)) to Proposed Standard X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ietf@ietf.org List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Aug 2013 07:23:51 -0000 The IESG has received a request from the Transport Layer Security WG (tls) to consider the following document: - 'Out-of-Band Public Key Validation for Transport Layer Security (TLS)' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-08-16. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies a new certificate type and two TLS extensions, one for the client and one for the server, for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) for use with out-of-band public key validation. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-tls-oob-pubkey/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-tls-oob-pubkey/ballot/ No IPR declarations have been submitted directly on this I-D. From agc@nef.pbox.org Thu Aug 1 09:21:40 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33C8C11E8121; Thu, 1 Aug 2013 09:21:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MsdBaZI0xpLf; Thu, 1 Aug 2013 09:21:38 -0700 (PDT) Received: from nef.pbox.org (ns.pbox.org [IPv6:2001:41d0:1:e836::1]) by ietfa.amsl.com (Postfix) with ESMTP id F0CD611E810A; Thu, 1 Aug 2013 09:21:37 -0700 (PDT) Received: from nef.pbox.org (localhost [127.0.0.1]) by nef.pbox.org (8.14.5/8.14.5/) with ESMTP id r71GLXmw015050 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 1 Aug 2013 18:21:33 +0200 (CEST) Received: (from agc@localhost) by nef.pbox.org (8.14.5/8.14.5/Submit) id r71GLVks029988; Thu, 1 Aug 2013 18:21:31 +0200 (CEST) Date: Thu, 1 Aug 2013 18:21:31 +0200 From: Alistair Crooks To: Ben Laurie Message-ID: <20130801162131.GT12793@nef.pbox.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-PGP-Fingerprint: D415 9DEB 336D E4CC CDFA 00CD 1B68 DCFC C059 6823 User-Agent: Mutt/1.5.21 (2010-09-15) X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.4.3 (nef.pbox.org [0.0.0.0]); Thu, 01 Aug 2013 18:21:34 +0200 (CEST) X-Mailman-Approved-At: Fri, 02 Aug 2013 00:52:43 -0700 Cc: "therightkey@ietf.org" , "tls@ietf.org" Subject: Re: [TLS] [therightkey] Revamped CT site X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Aug 2013 16:22:45 -0000 On Thu, Aug 01, 2013 at 12:04:26PM +0100, Ben Laurie wrote: > We've finally brought the CT > site, [1]http://www.certificate-transparency.org/, back up to speed. > Comments welcome! Dogfooding, I'd kind of expected port 443? From balfanz@google.com Fri Aug 2 03:10:25 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C89C11E828C for ; Fri, 2 Aug 2013 03:10:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.977 X-Spam-Level: X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0ZT5kn-9dlwR for ; Fri, 2 Aug 2013 03:10:24 -0700 (PDT) Received: from mail-ob0-x234.google.com (mail-ob0-x234.google.com [IPv6:2607:f8b0:4003:c01::234]) by ietfa.amsl.com (Postfix) with ESMTP id 5D84C11E8210 for ; Fri, 2 Aug 2013 03:10:24 -0700 (PDT) Received: by mail-ob0-f180.google.com with SMTP id up14so793658obb.25 for ; Fri, 02 Aug 2013 03:10:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=RRykl+aAUfZFGgjPXVArwe6SEYhjpUbo9Ek7YKz5w7I=; b=mAfopTY1ogOMksk0hnt1FkCBacWjeyFcbRB0KQjooA+jDipu30Db2PG+0Qcbkwmlu9 dWAPpR6wI9IYKqE6nJZzX5pMa0O2pi2urDaWvO25RmBUYmvCIg20CWBXMO21ZqTHsq9N YehsKlJkKoUu9Crqe5JzxZFSGwi4ualERE20R2vCQ8BfvT7yUkg2oFXsbdXSCzvEkGHQ FKQs7fKUS+OgS43amcK6ngpOZub6j9ciYi7oRCmyM7lTQyaQuwlZzAOyEomZZgKujX0h NVw6xfAbEECNkq2knYlRsGlbDQFD52/bwuDhYmpi07b60e3H4RpjWYYz7SRl588Km2AF jrgw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=RRykl+aAUfZFGgjPXVArwe6SEYhjpUbo9Ek7YKz5w7I=; b=osAQYZotB9+5CUdnztyYkYLQjVjN1z13fpMkvtIuuMXQRsoNMzjDbHVpwrdVnEwfIx v/hV2WtqpWftzJCdzn7LLmq2zomxGITDxjzCWqeerzGkxgu6c3if4N7lcbg5IMY3Iwhx n2yjqaOhVP9uTvT6ibIRUgmN8eLEg2R87wUikl5/8wJVHmCgkS7kzhwGppBU0jdXqdkY nWjYMHM3/VLYvOSGGNJ6SdkeKKuI5c+t/MNRBCiXXuoJieSzJD690Ur17ts9RyrVqC67 0RnLsgbVrH3RzMRTcZFgvVKhU787gP+W302ygm1OlLVqIiEwu1Q9lCqiGuGmi0tEXTUz T4zg== X-Gm-Message-State: ALoCoQmBR2pB0SYG3Vf42jRUUiccgl/U6SF8aUdZGC7mML4xujh8hdt/U0tWza7DGkpFCqrfa0KfxdioD8d/Mw1kL1JSuy74kHddztKe4QbDVzcRf9yQ0Dc+DkGTZsDKA8431HnLOVhmge1WYiz5D0/swaG4mXCGmsmftvUcdSViQjKFdV6ZjNNy2gio+GntjLJHn/h5c1l1 MIME-Version: 1.0 X-Received: by 10.50.16.102 with SMTP id f6mr221123igd.41.1375438223742; Fri, 02 Aug 2013 03:10:23 -0700 (PDT) Received: by 10.64.33.107 with HTTP; Fri, 2 Aug 2013 03:10:23 -0700 (PDT) Date: Fri, 2 Aug 2013 03:10:23 -0700 Message-ID: From: Dirk Balfanz To: IETF TLS WG Content-Type: multipart/alternative; boundary=047d7bdc0cf0bcb44204e2f42a67 Subject: [TLS] channel id and oob X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Aug 2013 10:10:25 -0000 --047d7bdc0cf0bcb44204e2f42a67 Content-Type: text/plain; charset=ISO-8859-1 Hi guys, I was asked to write a quick analysis of draft-ietf-tls-oob-pubkey, and whether it can be applied to the use cases we have in mind for Channel ID. My conclusion is that it can not, or that the necessary modifications to the OOB draft would be too substantial to be considered during Last Call. First, the similarities: both proposals allow the client to prove possession of a key pair. The fact that this proof-of-possession is forthcoming is negotiated using the TLS extension mechanism (during ClientHello/ServerHello). Now for the differences: - We don't want the client public key to be sent in the clear. It's a client identifier, and shouldn't be known to anyone but the client and the server. - We don't want the proof-of-keypair-possession to be part of the session state, for two reasons: - It blows up the session state, with ramifications on the size of the fleet of servers that cache this information. Remember that in our use case, we don't intend this to be used for the occasional client that wants to use non-password authentication with the server; it's designed to be used by _every_ client talking to big service providers like Google. Raw public keys are of course smaller than full certificates, but they still represent a significant increase in the size of session state. - We don't want someone who is not actually wielding the private key of the keypair to make it appear to the server as if they were in control of that private key. Session resumption, however, gives you that power: Let's assume that the private key of the keypair sits in a hardware-protected secure element, and is therefore out of reach of malware. Master secrets and other session information, however, is very likely kept in RAM and therefore available to thieves. If such a thief extracts the session data from the client and resumes the session, the server will treat the thief as the holder of the original private key. If the proof-of-keypair possession is explicitly declared not part of the session, then a client has to re-prove possession of the keypair even during abbreviated handshakes. Thus, a thief of session secrets (but not of the private key) won't be able to convince a server that it is in control of that private key. The oob-draft keeps the raw key in the session state, thus inheriting this problem with session state and session resumption. - Channel ID keys are different from key material sent in the Certificate message, and the certificate message shouldn't be overloaded with this new semantics: Key material presented in the Certificate message (even if it's a raw key) presumably carries some semantics for the application: "this is a certain user", "this is an enterprise-issued machine", etc., while the Channel-ID keys are always self-generated and their semantics include (among other things) "this is the key that will be nuked when the user presses the 'reset my browsing state' button". It makes for tricky implementations when those two different semantics get mapped to the same protocol message. More importantly, applications may want to do both: authenticate a user with a client cert, and then set a channel-bound cookie as a result of the authentication. You can't do that if you only have one proof-of-possession available in the handshake. As mentioned above, I don't really see how this issues could possibly be addressed within the draft-ietf-tls-oob-pubkey draft, especially since it's in last-call. Just the first point above alone seemed to be something that folks didn't want to touch until TLS 1.3. Thoughts? Dirk. --047d7bdc0cf0bcb44204e2f42a67 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Hi guys,=A0

I was asked to write a quic= k analysis of=A0draft-ietf-tls-oob-pubkey, and whether it can be applied to= the use cases we have in mind for Channel ID.

My = conclusion is that it can not, or that the necessary modifications to the O= OB draft would be too substantial to be considered during Last Call.

First, the similarities: both proposals allow the clien= t to prove possession of a key pair. The fact that this proof-of-possession= is forthcoming is negotiated using the TLS extension mechanism (during Cli= entHello/ServerHello).

Now for the differences:
  • We don't= want the client public key to be sent in the clear. It's a client iden= tifier, and shouldn't be known to anyone but the client and the server.=

  • We don't want the proof-of-keypair-possession to be part o= f the session state, for two reasons:
    • It blows up the session s= tate, with ramifications on the size of the fleet of servers that cache thi= s information. Remember that in our use case, we don't intend this to b= e used for the occasional client that wants to use non-password authenticat= ion with the server; it's designed to be used by _every_ client talking= to big service providers like Google. Raw public keys are of course smalle= r than full certificates, but they still represent a significant increase i= n the size of session state.
    • We don't want someone who is not actually wielding the private key = of the keypair to make it appear to the server as if they were in control o= f that private key. Session resumption, however, gives you that power: Let&= #39;s assume that the private key of the keypair sits in a hardware-protect= ed secure element, and is therefore out of reach of malware. Master secrets= and other session information, however, is very likely kept in RAM and the= refore available to thieves. If such a thief extracts the session data from= the client and resumes the session, the server will treat the thief as the= holder of the original private key. If the proof-of-keypair possession is = explicitly declared not part of the session, then a client has to re-prove = possession of the keypair even during abbreviated handshakes. Thus, a thief= of session secrets (but not of the private key) won't be able to convi= nce a server that it is in control of that private key.
The oob-draft keeps the raw key in the session state, = thus inheriting this problem with session state and session resumption.
  • Channel ID keys are different from key= material sent in the Certificate message, and the certificate message shou= ldn't be overloaded with this new semantics: Key material presented in = the Certificate message=A0(even if it's a raw key)=A0presumably carries= some semantics for the application: "this is a certain user", &q= uot;this is an enterprise-issued machine", etc., while the Channel-ID = keys are always self-generated and their semantics include (among other thi= ngs) "this is the key that will be nuked when the user presses the = 9;reset my browsing state' button". It makes for tricky implementa= tions when those two different semantics get mapped to the same protocol me= ssage. More importantly, applications may want to do both: authenticate a u= ser with a client cert, and then set a channel-bound cookie as a result of = the authentication. You can't do that if you only have one proof-of-pos= session available in the handshake.
As mentioned above, I don't really see how this issues could = possibly be addressed within the draft-ietf-tls-oob-pubkey draft, especiall= y since it's in last-call. Just the first point above alone seemed to b= e something that folks didn't want to touch until TLS 1.3.

Thoughts?

Dirk.

--047d7bdc0cf0bcb44204e2f42a67-- From benl@google.com Sat Aug 3 06:43:22 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A61521F9D89 for ; Sat, 3 Aug 2013 06:43:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.98 X-Spam-Level: X-Spam-Status: No, score=-0.98 tagged_above=-999 required=5 tests=[AWL=-0.862, BAYES_20=-0.74, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5v6Xt4KQso33 for ; Sat, 3 Aug 2013 06:43:22 -0700 (PDT) Received: from mail-qc0-x22d.google.com (mail-qc0-x22d.google.com [IPv6:2607:f8b0:400d:c01::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 350A121F9D95 for ; Sat, 3 Aug 2013 06:43:19 -0700 (PDT) Received: by mail-qc0-f173.google.com with SMTP id z10so859756qcx.32 for ; Sat, 03 Aug 2013 06:43:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=uREHhji4YXbMUfhDlPNsW3mDABcyw4VI7eQWR9dUtJk=; b=XXmQHR7ltPWf6OgOkajhqUlo2M4+4mfst+TUdnNLvZW0OrLGuudlRGXD+5k9aJlcwq 3SZpkDPvS96UzM+S9v5yl3lHpniGstj//OojrLNsjmDdd1QTiashDhfHMlSlOqY5dx/H pQjBO4bzMFIqlL5uG6vQTUG/WGXBQjB8XDaF6cp8XX3Zlscn+pbSYqvxfN8CSVLASquh 9VeES7RF+mcx4Bg+pcQFR+DuKfULaGcFDtk4asq3UQHlVOxPTM1OUkF+8oCpFxFK9Dz+ ZT/OGXJx+WdBXg53KpoK+4Cq+cYODtS7sqn4MwoFV1vvz11zR28GSKrj++P6PHV8peTD ENfw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type :x-gm-message-state; bh=uREHhji4YXbMUfhDlPNsW3mDABcyw4VI7eQWR9dUtJk=; b=WnXMMOwZS2hIwZTF2jixsmYM64v0zJCTnWOfwotJnW8oJswbJcD7eASd552TP9Jcta /sZnrRK9Rz2zDbOlWAwuN5812oV1/HmIViQmUoeHMqnayDe/CzdoF3L6NAvuhBI9CXG9 l5m5hASMtW9y6LAvRl9gxxGJ1Rsg4/XtJzkGHO6MM8baUEvM6FTO0Y3s3vXdS78YN1y7 YSYbXjtQ2LX5AblqNOhcnTuOwpUmtljVDMy/FPpj7HgrlffrB7pV0c6hwulPEBR26gRP r7mhhv+yTEko+uJECMqe1neZQccE778LWXcJL4gf5oZxaOBeOSnXZHwDPblrpsqrPc4L mUyQ== MIME-Version: 1.0 X-Received: by 10.224.21.202 with SMTP id k10mr17593830qab.10.1375537398617; Sat, 03 Aug 2013 06:43:18 -0700 (PDT) Received: by 10.229.169.196 with HTTP; Sat, 3 Aug 2013 06:43:18 -0700 (PDT) Date: Sat, 3 Aug 2013 14:43:18 +0100 Message-ID: From: Ben Laurie To: "tls@ietf.org" , IETF DANE WG list , certificate-transparency@googlegroups.com, "therightkey@ietf.org" Content-Type: multipart/alternative; boundary=047d7bf0c10c05508f04e30b4266 X-Gm-Message-State: ALoCoQlp+jFwzufKRzYpSsKF3elJ1NDMwIzEsvLNGsgrn6uMdLpPcljy6kDd3HHQYZ7tNSVuVp4V3C959ljjQaA8aaw4O/syX+7s2GloZVpxBU/xbKP5DZp/5427TGK27v1zWZl05LTLzmgd1A696PNph/J4ibqRa9iBR0yxmcKLFMYzs0+YpuEFL5ZOqwbhRgZvzylchWwY Subject: [TLS] Certificate Transparency Hack Day: Weds Aug 28th X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Aug 2013 13:43:22 -0000 --047d7bf0c10c05508f04e30b4266 Content-Type: text/plain; charset=ISO-8859-1 We've set the date: Weds Aug 28th at Google's London office. More information to follow soon. --047d7bf0c10c05508f04e30b4266 Content-Type: text/html; charset=ISO-8859-1
We've set the date: Weds Aug 28th at Google's London office.

More information to follow soon.

--047d7bf0c10c05508f04e30b4266-- From agl@google.com Tue Aug 6 08:25:43 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF88821F9EB8 for ; Tue, 6 Aug 2013 08:25:43 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.453 X-Spam-Level: X-Spam-Status: No, score=-0.453 tagged_above=-999 required=5 tests=[AWL=-1.524, BAYES_05=-1.11, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001, SARE_MLB_Stock6=1.56] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k9UBi42tESll for ; Tue, 6 Aug 2013 08:25:43 -0700 (PDT) Received: from mail-oa0-x231.google.com (mail-oa0-x231.google.com [IPv6:2607:f8b0:4003:c02::231]) by ietfa.amsl.com (Postfix) with ESMTP id D123221F9C53 for ; Tue, 6 Aug 2013 08:25:33 -0700 (PDT) Received: by mail-oa0-f49.google.com with SMTP id n10so983933oag.36 for ; Tue, 06 Aug 2013 08:25:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=nvn3xwThZWieF0TOJAq80oa+50onmZwlmwmHTiNhBRY=; b=KHrsL3j26TxsU/2838d7iHvTW5UiKM1gregkvyexwkOaOYyKJgiVjPTSNE2yte97aC rbv3ii0PNs+SXhm9OPihRRLj5orY7YBx+39KMgPT8/wol+kU61zCE2ZRJ275I/r7Cu92 k6sZq8vfso4A62sqh5U0PeAo/8UCPrSBtM5WdpNQHcvZFR11iKPsjlX6O0vvzecKK6W4 jKYfMnoMqcbdDH1bNX+V0lUu3EbQqRWvEKZiI0rKaC7x8xEP1G+SROeiMWk8x23ynyV6 rjZ8+CqcZC3QIwI2/CYNo2oUuPZL9ThhKQrDLXChzl2VwnwAG+t81E4zL6vZb3hfNiOm qgog== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=nvn3xwThZWieF0TOJAq80oa+50onmZwlmwmHTiNhBRY=; b=pNqLjwY+/epkM4f3ErWQmvoLDCJDGZiXRuH0mmSE/I8qgo87tPSA3OdCmAjSkAh8Y3 sDwitMjXwosl7zbxOBhhS3tuCUMaAXICuIikflb0/tfBpj6M7hAfF8YeY3ADdJxlT5BO QrxS0RNVRTDMRQcAt7sE3+o71hfekhZKWYebacQzhyPyaMDO4aw/uNehf9BU7u7qiD3D sQQWhWgViJWOk8Up0OIM6RV9+ToOtVXzgI9uDfN35z/tbJDwk6p6aj3A+NFctHSb3Yc4 9RxMAvvP91fosid316KhspGI4W3DvbPNhxUzl+RQ9va6/jkD+ICEHhdVEeg0OY0voGAQ HXiQ== X-Gm-Message-State: ALoCoQkTJrs7XCtdeOPZESh6ylZWX3HmoaBXV+6B6DxPqSXD2rc21Nijmq5USw1wfkVQclcZZ33LMteGxN5KVuL/+nF/8cF0IU+upA5uN4ZCODvH5/Bsamw1PsuoK5oP2UpclZ3n9aGziSUZ5A4X74rsS0F/IkNdQtd/CNjxAOzFiISn2HH+zSPX/rW/wEt4WE5a5+s91+ww X-Received: by 10.60.42.168 with SMTP id p8mr1411672oel.73.1375802733160; Tue, 06 Aug 2013 08:25:33 -0700 (PDT) MIME-Version: 1.0 Received: by 10.182.111.66 with HTTP; Tue, 6 Aug 2013 08:25:12 -0700 (PDT) In-Reply-To: References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> From: Adam Langley Date: Tue, 6 Aug 2013 11:25:12 -0400 Message-ID: To: Ted Krovetz Content-Type: text/plain; charset=UTF-8 Cc: "tls@ietf.org" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Aug 2013 15:25:43 -0000 On Tue, Jul 30, 2013 at 10:45 AM, Adam Langley wrote: > I will try to repeat the above benchmarks for VMAC this week. (And, hopefully, run some tests on ARM.) Recap, to authenticate 1K of data: UMAC96 (with AES for nonce generation, since Nikos suggested that was the intended design previously): 9146ns HMAC-SHA1: 3667ns Poly1305: 561ns On the same machine (E5-2690@2.90GHz with Hyperthreading and Turboboost disabled), with VMAC code from fastcrypto.org: VMAC (128-bit, with AES calls removed in order to better compare to Poly1305): 270ns with 248 bytes of memory On a Cortex-A8 (specifically a Galaxy Nexus) using Linaro GCC 4.7: VMAC (128-bit, with AES calls removed): 13203ns with 248 bytes of memory Poly1305 (code from SUPERCOP): 3567ns For VMAC I used ARM optimised code provided by Ted Krovetz. Other, random measurements: VMAC (128-bit, AES for nonces, Intel): 368ns with 424 bytes of memory and 1308ns one-time key schedule. VMAC (64-bit, no AES, Intel): 138ns, 360 bytes of memory. VMAC (64-bit, AES, Intel): 229ns, 360 bytes of memory. VMAC (128-bit, AES, ARM): 14322ns, 424 bytes of memory For the ARM measurements I was careful to do them with the screen on and unlocked. Android reduces the clock speed when the phone is `asleep'. When measuring VMAC "with AES", I used "rijndael-alg-fst.c", not OpenSSL. When removing AES from VMAC I just removed all AES calls and AES related elements of the context structure. That's not intended to be a real design, but a reasonable simulation for the purposes of timing. Poly1305 is very fast on ARM, but VMAC is twice as fast on servers at the cost of a bit of memory. I think I'm still leaning towards Poly1305, but I could be persuaded by VMAC, it's very impressive. Cheers AGL From agl@google.com Tue Aug 6 09:38:40 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39C7F21F9F3A for ; Tue, 6 Aug 2013 09:38:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.673 X-Spam-Level: X-Spam-Status: No, score=-1.673 tagged_above=-999 required=5 tests=[AWL=0.305, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xBOAJGQWTGTg for ; Tue, 6 Aug 2013 09:38:39 -0700 (PDT) Received: from mail-ob0-x233.google.com (mail-ob0-x233.google.com [IPv6:2607:f8b0:4003:c01::233]) by ietfa.amsl.com (Postfix) with ESMTP id CA78221F9F59 for ; Tue, 6 Aug 2013 09:38:39 -0700 (PDT) Received: by mail-ob0-f179.google.com with SMTP id fb19so1347803obc.38 for ; Tue, 06 Aug 2013 09:38:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=nz2yOWY7BTUn8t1QxsTeTnXspTIpgAFcUR58QPT86AE=; b=SgC8HRSDA3O8JFigm3cszKlL11VxbVfLC3f6acO079iqtU8f25R0ZgYtIGnNAeX71l 9Tpwf1s7xnNS2JBLUBxZc99m9jIiWsaFpeosMFxYXadxDuGMVMoOWJmhEvD4Lh/wrs++ 5df4a88GhW7M6KgzihiO03oSSWptjIhh2d7mAko6pV95X5SW46jRdE5L74CoAm1WqSTa wOGm8rV9ln/Lp1elJD6z8pUGkdh/E1+OMEQ9EvYZIbq0Z36WUlFC8guVtj+Xv1h1GoF/ fryxX6CKblVjVIotGr7N4u4VXlOQ7ZHpfBhyE5nyLIFDoncRkynn7/rwlgvSudmF1180 +eOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=nz2yOWY7BTUn8t1QxsTeTnXspTIpgAFcUR58QPT86AE=; b=UlWM0yQlHUPhstykI58zQpAsLeyvZ9dMOj6RP7iqUye6wmC9p2/gljZHbqzfMGI+Ac LS5IZ2wGFAkC/QDix1Re8pzhlzTZckudEiO6AoEfZtY56dVTG9sMotgO/f0ZjnO3o/tI UHyn1ZyDVHG23DkqIpMsrkiO9HAP3tsbj5XL4EG0gWvQHeFz5qrl7yNXcoZm6tCtE8BD tENBJihav22pqykcWrgfy8Jtvpp7wmyq8SWF3PMSQzlMNFWRQDStDJEy+pokra62NL3c MesQQKcJfXt4i1euPNt6OgIBs82rZTWKNgFYxbpYJZJ72ZiccISWIi7ChG8MqY8jxtnU nTmw== X-Gm-Message-State: ALoCoQnlEKPYUUgNFXMVOv+BL0ysoXAc/uorrEv/BE/c2ckfRp5euoMCVRchH/UYqlO4BgA+73XNEIMzig/9W/UNfAliSspWuHGnJde/BCF0qMYap5DSeZ01SN/pND85jY4jfHLbEJc14BK4eyAwXqpZ/8CmblmPFAReNz6zDkG/Is0Iv/Oz3jorY2SxRjDZ+izD/6vrxkPI X-Received: by 10.60.38.234 with SMTP id j10mr1752724oek.42.1375807119010; Tue, 06 Aug 2013 09:38:39 -0700 (PDT) MIME-Version: 1.0 Received: by 10.182.111.66 with HTTP; Tue, 6 Aug 2013 09:38:18 -0700 (PDT) In-Reply-To: References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> From: Adam Langley Date: Tue, 6 Aug 2013 12:38:18 -0400 Message-ID: To: Ted Krovetz Content-Type: text/plain; charset=UTF-8 Cc: "tls@ietf.org" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Aug 2013 16:38:40 -0000 On Tue, Aug 6, 2013 at 12:20 PM, Ted Krovetz wrote: > I'm a bozo. When I gave you the VMAC code using ARM intrinsics I should have explicitly reminded you to enable NEON when compiling: > > gcc -mcpu=cortex-a8 -mfpu=neon -mfloat-abi=hard > > On a modern ARM, you should always use these settings so that your compiler uses the NEON unit when possible. Thank you! I used -O3, but I don't develop on ARM very often. Please ignore previous measurements for VMAC on ARM. VMAC (ARM, 128-bit, with AES calls removed): 5015.1ns with 248 bytes of memory Poly1305 (ARM, with same flags): 3457ns I don't believe that either can be said to be better than the other now, which makes the call harder if anything :) Cheers AGL From benl@google.com Tue Aug 6 14:55:05 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF7CF21F846E for ; Tue, 6 Aug 2013 14:55:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.777 X-Spam-Level: X-Spam-Status: No, score=-1.777 tagged_above=-999 required=5 tests=[AWL=0.200, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rJhJkWjmpPGH for ; Tue, 6 Aug 2013 14:55:05 -0700 (PDT) Received: from mail-ob0-x236.google.com (mail-ob0-x236.google.com [IPv6:2607:f8b0:4003:c01::236]) by ietfa.amsl.com (Postfix) with ESMTP id 2AFA421F997E for ; Tue, 6 Aug 2013 14:54:57 -0700 (PDT) Received: by mail-ob0-f182.google.com with SMTP id wo10so2171118obc.27 for ; Tue, 06 Aug 2013 14:54:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=FY/wGRdc8cmXcikoSPoicS2c+1sSsvD5DUnUemRbiQ4=; b=kUqJQ/7xhlMJEcUoFSLCGn5YUqIj8hxVmMQEg3+eAwR2rD91GXXEEJ6txHxdl6iKz/ kGk/G/2Ee09w8DFL6UCLvMABoTUHuYxKyzGEbGRvc2D4D2gQVfHGp/D/V8/aNOjgjRQH ReQMq2X/TJvDYDZWLMslP9HFeqGj/WXj7+IWx/DYdxs0cfAVYlAUIivQHYxhc0UJHKpK 81GogzV93IwleCE5hDyWlsejXVdRSDh2W7nptIbULEGRT7/LZM2BY7f4JLHCcw59n3So Nj9zqmHmzPZu1ln3JC7ktqoJRFyajtn1l37mBzNBvcQi60/9v2JSaIqLi+5uMWu8V3AG 3GCA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=FY/wGRdc8cmXcikoSPoicS2c+1sSsvD5DUnUemRbiQ4=; b=ekvz63WCf7jYlnuOwKI/LT20msT8hmMi8ijPqxbQmCYHqIERyhkDuMr7kto6a79uPl DZ9ieP6uccZYVBvjxy/FnA1u/oxe1S7NxCu7PB93fvEyUEL2+tqQssGS9kyJB3eWI/r4 D7nneYJVsq/L6erlYp5Eg+6oAd0GkEGKfmpMwQtbTW68T49DuhlMJzZ9SEfYjV7p2ea9 j2cxAFhDj/H1fgBQSF/Ot8hSvXFP/toYUVRpRjzgVAIiUqisinvQHN78xDJzPdMT1jVV DqQCWZfVULCibAjQVC10gnAK9yTx7AzT0ehu16RRNQQfA+AoKmb5PjT4y8k9HEiy7obh qiYA== X-Gm-Message-State: ALoCoQncAX7B7Z5Afg14ScDGu4ZArEXWrUD8eDBSEr5sppikuG56PxzblqKq/OWAllrC18zF5UrTqu9Ngsv7DVDviu5Uux5JleiuNcJ72iAUs82Zeo/uzFhpGMQ4ymkPnJdcaHFfIh7Zdx8nNMThWMW9rvUV6h0T8NSo7VzQ46AOmjb2OE+Pvm+6Hl8P50OmaUbvHV6X6Z8H MIME-Version: 1.0 X-Received: by 10.50.154.106 with SMTP id vn10mr506466igb.0.1375826093134; Tue, 06 Aug 2013 14:54:53 -0700 (PDT) Received: by 10.64.230.239 with HTTP; Tue, 6 Aug 2013 14:54:52 -0700 (PDT) In-Reply-To: References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> Date: Tue, 6 Aug 2013 22:54:52 +0100 Message-ID: From: Ben Laurie To: Adam Langley , Emilia Kasper Content-Type: multipart/alternative; boundary=047d7bd74b628dfad104e34e7997 Cc: Ted Krovetz , "tls@ietf.org" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Aug 2013 21:55:06 -0000 --047d7bd74b628dfad104e34e7997 Content-Type: text/plain; charset=ISO-8859-1 [+ekasper] Emilia was getting some interesting results doing this kind of stuff many times in parallel... On 6 August 2013 17:38, Adam Langley wrote: > On Tue, Aug 6, 2013 at 12:20 PM, Ted Krovetz wrote: > > I'm a bozo. When I gave you the VMAC code using ARM intrinsics I should > have explicitly reminded you to enable NEON when compiling: > > > > gcc -mcpu=cortex-a8 -mfpu=neon -mfloat-abi=hard > > > > On a modern ARM, you should always use these settings so that your > compiler uses the NEON unit when possible. > > Thank you! I used -O3, but I don't develop on ARM very often. > > Please ignore previous measurements for VMAC on ARM. > > VMAC (ARM, 128-bit, with AES calls removed): 5015.1ns with 248 bytes of > memory > Poly1305 (ARM, with same flags): 3457ns > > I don't believe that either can be said to be better than the other > now, which makes the call harder if anything :) > > > Cheers > > AGL > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > --047d7bd74b628dfad104e34e7997 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
[+ekasper]

Emilia was getting some inte= resting results doing this kind of stuff many times in parallel...


On 6 Augus= t 2013 17:38, Adam Langley <agl@google.com> wrote:
On Tue, Aug 6, 2013 at 12:20 PM, Ted Krovetz= <ted@krovetz.net> wrote:
> I'm a bozo. When I gave you the VMAC code using ARM intrinsics I s= hould have explicitly reminded you to enable NEON when compiling:
>
> =A0 gcc -mcpu=3Dcortex-a8 -mfpu=3Dneon -mfloat-abi=3Dhard
>
> On a modern ARM, you should always use these settings so that your com= piler uses the NEON unit when possible.

Thank you! I used -O3, but I don't develop on ARM very often.

Please ignore previous measurements for VMAC on ARM.

VMAC (ARM, 128-bit, with AES calls removed): 5015.1ns with 248 bytes of mem= ory
Poly1305 (ARM, with same flags): 3457ns

I don't believe that either can be said to be better than the other
now, which makes the call harder if anything :)


Cheers

AGL
_______________________________________________
TLS mailing list
TLS@ietf.org
htt= ps://www.ietf.org/mailman/listinfo/tls

--047d7bd74b628dfad104e34e7997-- From agl@google.com Tue Aug 6 15:01:21 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EE1E21F9EB3 for ; Tue, 6 Aug 2013 15:01:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.724 X-Spam-Level: X-Spam-Status: No, score=-1.724 tagged_above=-999 required=5 tests=[AWL=0.254, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hHqbbDDQH1oY for ; Tue, 6 Aug 2013 15:01:21 -0700 (PDT) Received: from mail-oa0-x22d.google.com (mail-oa0-x22d.google.com [IPv6:2607:f8b0:4003:c02::22d]) by ietfa.amsl.com (Postfix) with ESMTP id E59E821F9CD1 for ; Tue, 6 Aug 2013 15:01:20 -0700 (PDT) Received: by mail-oa0-f45.google.com with SMTP id m1so1973982oag.32 for ; Tue, 06 Aug 2013 15:01:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=X+S9kXOsVN+/HlxabwApSHeed3q6oF+IDeLHHKIQoQA=; b=FgDnlSfrm1uvzgQ451CrDxy4tUHGEHl2+FMdSJ02kWa+ESsab1LqkX/dYpbbCfUui+ SsWyVEdjMRjSgjFlpef/g9kpUzdzrlV+OzPELz6asB2+myOPJlmvvbKrXDDAuQzzebU6 SDg8cjZkurcWIktB/utmd52xXcrcp5JTzrKa2YK9F1BgHO3klfhCkZO359YD1i9GK5Lx R+vtTtZoc/zKZhK3KsD0q+RYn8o2jSPrGl1765vOq4ifbdwg9WQT8EZ4xG7pLafYCzqk VBa5eHOV4wFIK5iiGJrZqHlrxkRWE8k+8R7AIzg37KUxqE4zBayx23G+WAMdvT17ySAo +bkA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=X+S9kXOsVN+/HlxabwApSHeed3q6oF+IDeLHHKIQoQA=; b=MYtR8KaD+zV+JwbPGCGpAeeGVjMzmchtyF0EWUwSleCyShJxcpKKMPnVOQNlRFOKWu PwdNDIso+1BGKfL2MlN+v0rLHb6lXESyn3WT9fcIHRwQjSRT59SqvAq414lq4GxDmFNG evCKmmaRtpOH/SMAKHgvjdnHGf46lL+HDipfByOTpRGclWSxOsohOPAJrwTmYdB3DUq8 aI1D/2dTlwhcsN0vkzhE43CAhUnAYy4i/dFRF/cVtzSpLkd43ykxx6KhCDdNqRqunuA/ +pvQYEJtwNaJNNXqLob7MZZ83MpJPedxOSuKdgpW2b4QU9/rbpxDIr2Hj7MAgFfFb/65 3qVQ== X-Gm-Message-State: ALoCoQmBd101CB9wQxiiO4QwZEyKzBaHMcljTTxl4padpr/lnELSCSomI5GHirfLUWqgXEGSq4eHYWd+8sQFz7WLVrHSc/Vsko9BXyIneJS8GQ5UCan7NwY5butPr7iFnxcSuG7mapBk04xvFRIslZlXLHnQzI52Y4uhEaGfim2lZTKz9G7MI5VkROqfetgzb6fzICzJheha X-Received: by 10.60.42.168 with SMTP id p8mr171027oel.73.1375826480475; Tue, 06 Aug 2013 15:01:20 -0700 (PDT) MIME-Version: 1.0 Received: by 10.182.111.66 with HTTP; Tue, 6 Aug 2013 15:01:00 -0700 (PDT) In-Reply-To: References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> From: Adam Langley Date: Tue, 6 Aug 2013 18:01:00 -0400 Message-ID: To: Ben Laurie Content-Type: text/plain; charset=UTF-8 Cc: Ted Krovetz , Emilia Kasper , "tls@ietf.org" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Aug 2013 22:01:21 -0000 On Tue, Aug 6, 2013 at 5:54 PM, Ben Laurie wrote: > Emilia was getting some interesting results doing this kind of stuff many > times in parallel... The Poly1305 code is doing multiple terms of the polynomial concurrent with SSE2 and NEON. I'm assuming that VMAC is doing the same. That does bode well for the AVX2/AVX-512 future, but those chips are widely distributed yet. Cheers AGL From alexey.melnikov@isode.com Thu Aug 8 08:26:53 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8348111E8132; Thu, 8 Aug 2013 08:26:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.776 X-Spam-Level: X-Spam-Status: No, score=-101.776 tagged_above=-999 required=5 tests=[AWL=0.824, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EOc09VmXuFz0; Thu, 8 Aug 2013 08:26:48 -0700 (PDT) Received: from statler.isode.com (statler.isode.com [62.3.217.254]) by ietfa.amsl.com (Postfix) with ESMTP id 51D0C11E814C; Thu, 8 Aug 2013 08:26:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1375975607; d=isode.com; s=selector; i=@isode.com; bh=TwASpAMHgbRb/efhcyU0hoR/qAsNrA/hDcbn97XbcDk=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=dGsMd30XxnVnmdoE+/YsZZKk6PQpRdCwG5h+/at+DacCMecQ5Pk6+/hfS5E+jqdttn6Fb6 CDTpt0xzqVKPNEz6BmiLWHvNapgUzeUmm4LpAnlKQ1qoNoqzblosni5+02oZb8zrjMV17Y zjDQF50ilBBiC3Fb/xl3mvOXvVJJsb4=; Received: from [172.16.1.29] (shiny.isode.com [62.3.217.250]) by statler.isode.com (submission channel) via TCP with ESMTPA id ; Thu, 8 Aug 2013 16:26:46 +0100 Message-ID: <5203B8BC.9080108@isode.com> Date: Thu, 08 Aug 2013 16:26:52 +0100 From: Alexey Melnikov User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20130620 Thunderbird/17.0.7 To: ietf@ietf.org References: <20130802072350.14846.84073.idtracker@ietfa.amsl.com> In-Reply-To: <20130802072350.14846.84073.idtracker@ietfa.amsl.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: tls@ietf.org Subject: Re: [TLS] Last Call: (Out-of-Band Public Key Validation for Transport Layer Security (TLS)) to Proposed Standard X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Aug 2013 15:26:53 -0000 On 02/08/2013 08:23, The IESG wrote: > The IESG has received a request from the Transport Layer Security WG > (tls) to consider the following document: > - 'Out-of-Band Public Key Validation for Transport Layer Security (TLS)' > as Proposed Standard > > The IESG plans to make a decision in the next few weeks, and solicits > final comments on this action. Please send substantive comments to the > ietf@ietf.org mailing lists by 2013-08-16. Exceptionally, comments may be > sent to iesg@ietf.org instead. In either case, please retain the > beginning of the Subject line to allow automated sorting. > > Abstract > > > This document specifies a new certificate type and two TLS > extensions, one for the client and one for the server, for exchanging > raw public keys in Transport Layer Security (TLS) and Datagram > Transport Layer Security (DTLS) for use with out-of-band public key > validation. Hi, I just read the document and support its publication. I think I found one minor issue: Section 4.1 says: In order to indicate the support of out-of-band raw public keys, clients MUST include the 'client_certificate_type' and 'server_certificate_type' extensions in an extended client hello message. The hello extension mechanism is described in TLS 1.2 [RFC5246]. In Section 5 (the first example): client_hello, server_certificate_type=(RawPublicKey) -> // [1] So it looks like the example doesn't comply with the MUST requirement in the Section 4.1 ("client_certificate_type" is missing) or the requirement stated in Section 4.1 is incorrect. I suspect you meant "'client_certificate_type' and/or 'server_certificate_type'" in Section 4.1. Best Regards, Alexey From ted@krovetz.net Tue Aug 6 09:20:58 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11E4121F9FFC for ; Tue, 6 Aug 2013 09:20:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fd9x-YEJw2gK for ; Tue, 6 Aug 2013 09:20:50 -0700 (PDT) Received: from mail-pd0-f173.google.com (mail-pd0-f173.google.com [209.85.192.173]) by ietfa.amsl.com (Postfix) with ESMTP id AAAF221F991F for ; Tue, 6 Aug 2013 09:20:40 -0700 (PDT) Received: by mail-pd0-f173.google.com with SMTP id p11so458058pdj.4 for ; Tue, 06 Aug 2013 09:20:34 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=gDEgNDM2ZSQga4y/wdWw6mTBr9rI9pVpxrIY+fBoQFo=; b=JpFhx/h5gCLpR66aqSwhELvj6xw+lvPKcvVk31L3pqv4RPwIQ4rTdONbXNZsTxnQVA ExIqJdEd5esAe4rWx6HRjVgfUYkSOKXjgG4UoO6FbiLeUDiP5BQl0mTmAY5ImBjUnYYD tqkU12XnnV90X1iImyH4PNrjhJAmmr5t2j/iM0Oxipd4CnKzwX3SRcozV9cq7kj5pNwL e6ONITRMSSiaufOjvQt5lNaWP4SvKbTQPNI81fm+pUSgBccLqmNYdB+Z2OIOgoZPRuzH R3OyY0iJ70LaLpRkGIBEvcAmVeTKaHlsRMv9tUSdKotf4V32fFye+fMYUjNTE9fy9i+Q SQxA== X-Gm-Message-State: ALoCoQkTETnyJ3eDdzXL3S40qYX/faop/fBKAgzK/MKNcE1asDtLyZFNR+dvv+IfsoF5z8H0AWyX X-Received: by 10.66.122.5 with SMTP id lo5mr3991810pab.175.1375806034652; Tue, 06 Aug 2013 09:20:34 -0700 (PDT) Received: from [192.168.1.162] (c-67-166-145-119.hsd1.ca.comcast.net. [67.166.145.119]) by mx.google.com with ESMTPSA id il4sm2827843pbb.36.2013.08.06.09.20.32 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 06 Aug 2013 09:20:33 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Ted Krovetz In-Reply-To: Date: Tue, 6 Aug 2013 09:20:32 -0700 Content-Transfer-Encoding: quoted-printable Message-Id: References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> To: Adam Langley X-Mailer: Apple Mail (2.1508) X-Mailman-Approved-At: Sat, 10 Aug 2013 11:29:03 -0700 Cc: "tls@ietf.org" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Aug 2013 16:20:58 -0000 Adam, Thanks a lot for taking the time to do these tests. > On a Cortex-A8 (specifically a Galaxy Nexus) using Linaro GCC 4.7: I'm a bozo. When I gave you the VMAC code using ARM intrinsics I should = have explicitly reminded you to enable NEON when compiling: gcc -mcpu=3Dcortex-a8 -mfpu=3Dneon -mfloat-abi=3Dhard On a modern ARM, you should always use these settings so that your = compiler uses the NEON unit when possible. -Ted= From Michael.Tuexen@lurchi.franken.de Sun Aug 11 06:24:37 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81AB321F8CB0 for ; Sun, 11 Aug 2013 06:24:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u-YXkbex9-ap for ; Sun, 11 Aug 2013 06:24:37 -0700 (PDT) Received: from mail-n.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) by ietfa.amsl.com (Postfix) with ESMTP id CD9EC21F9703 for ; Sun, 11 Aug 2013 06:17:57 -0700 (PDT) Received: from [192.168.1.200] (p508F1653.dip0.t-ipconnect.de [80.143.22.83]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTP id 2BB991C0C069C for ; Sun, 11 Aug 2013 15:17:54 +0200 (CEST) From: Michael Tuexen Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Message-Id: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> Date: Sun, 11 Aug 2013 15:17:54 +0200 To: "tls@ietf.org" Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) X-Mailer: Apple Mail (2.1508) Subject: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Aug 2013 13:24:37 -0000 Dear all, while fixing a bug in OpenSSL regarding the DTLS handshake, I thought = about the following scenario (both sides decide to renegotiate at about the = same time): * A DTLS connection is established. * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission timer, since this is a flight. * The HelloRequest is dropped by the network. * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, since it is its first flight. * The server receives the ClientHello, stops the retransmission timer and sends the next flight starting with ServerHello(MsgSeqNo =3D 1)=20 since it considers the received ClientHello as an ack for the flight. * The client doesn't process the ServerHello, since it expects the MsgSeqNo =3D=3D 0. Therefore the client retransmits its ClientHello and the server = retransmits its flight containing the ServerHello. Am I missing something? The problem is that the server has no way to figure out if the received ClientHello is a reaction to a HelloRequest or not. The only way out I see is that the client accepts ServerHellos with MsgSeqNo=3D0 and MsgSeqNo=3D1. I don't think this is covered in http://tools.ietf.org/html/rfc6347 Any opinions? Best regards Michael= From andrewgwilson@gmail.com Sun Aug 11 07:25:53 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC02A11E80F9 for ; Sun, 11 Aug 2013 07:25:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lh2yLldGfmU6 for ; Sun, 11 Aug 2013 07:25:53 -0700 (PDT) Received: from mail-bk0-x22c.google.com (mail-bk0-x22c.google.com [IPv6:2a00:1450:4008:c01::22c]) by ietfa.amsl.com (Postfix) with ESMTP id 87CAC21E8050 for ; Sun, 11 Aug 2013 07:19:30 -0700 (PDT) Received: by mail-bk0-f44.google.com with SMTP id mz10so1897077bkb.31 for ; Sun, 11 Aug 2013 07:19:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=7D63AltDBDZ0CzQ3DF7WKP5Yb5w0N22Zsax123PPpeM=; b=EiljkGIch6/7Ti28NrVouRF2Zhsd4qSASHoYRsRvsuy9qnsigIJKKgrU/NYBFJrdu7 gqvk2w2VU9/JjkZSHlCglkmcU8oSHC6QWp7ojrccRmgN2rfAa3DnCcHlr5oPCkvzHfNR XvAuGwxRbQL8dhfGPtJw9xZfJLdoWUEf/giX6m2m1J7DhlHUKXQECFm7L7SRMiHlNSrn UTzSgniZ82JOMTQdKChDvKWm8zm54Ynnp1fr/Vl1ojdJshw7ky6kbLNtSDMPkuVO7wWG bG+UlTQB5hJEJeKWkPh36FWi0kH7pe82C8Jg6jphoiCxJ7elDmGW850kYH1Pyx0uAWJk XoWg== MIME-Version: 1.0 X-Received: by 10.204.187.196 with SMTP id cx4mr3000264bkb.118.1376230769559; Sun, 11 Aug 2013 07:19:29 -0700 (PDT) Received: by 10.205.115.141 with HTTP; Sun, 11 Aug 2013 07:19:29 -0700 (PDT) In-Reply-To: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> References: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> Date: Mon, 12 Aug 2013 02:19:29 +1200 Message-ID: From: Andy Wilson To: Michael Tuexen Content-Type: multipart/alternative; boundary=20cf302acee2263bb504e3acb215 Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Aug 2013 14:25:54 -0000 --20cf302acee2263bb504e3acb215 Content-Type: text/plain; charset=UTF-8 After looking over the RFC a bit, wouldn't the client be expecting a HelloVerifyRequest after its ClientHello? On 12 August 2013 01:17, Michael Tuexen wrote: > Dear all, > > while fixing a bug in OpenSSL regarding the DTLS handshake, I thought about > the following scenario (both sides decide to renegotiate at about the same > time): > > * A DTLS connection is established. > * The server sends a HelloRequest(MsgSeqNo = 0) and starts the > retransmission > timer, since this is a flight. > * The HelloRequest is dropped by the network. > * The client sends a ClientHello(MsgSeqNo = 0) and start a retransmission > timer, > since it is its first flight. > * The server receives the ClientHello, stops the retransmission timer > and sends the next flight starting with ServerHello(MsgSeqNo = 1) > since it considers the received ClientHello as an ack for the flight. > * The client doesn't process the ServerHello, since it expects the > MsgSeqNo == 0. > > Therefore the client retransmits its ClientHello and the server retransmits > its flight containing the ServerHello. Am I missing something? > > The problem is that the server has no way to figure out if the received > ClientHello is a reaction to a HelloRequest or not. > The only way out I see is that the client accepts ServerHellos with > MsgSeqNo=0 and MsgSeqNo=1. > I don't think this is covered in http://tools.ietf.org/html/rfc6347 > > Any opinions? > > Best regards > Michael > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > -- Regards Andy --20cf302acee2263bb504e3acb215 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
After looking over the RFC a bit, wouldn't the client = be expecting a=C2=A0HelloVer= ifyRequest after its ClientHello?

On 12 August 2013 01:17, Michael Tuexen <Michael.Tuexen@lur= chi.franken.de> wrote:
Dear all,

while fixing a bug in OpenSSL regarding the DTLS handshake, I thought about=
the following scenario (both sides decide to renegotiate at about the same<= br> time):

* A DTLS connection is established.
* The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the retransmis= sion
=C2=A0 timer, since this is a flight.
* The HelloRequest is dropped by the network.
* The client sends a ClientHello(MsgSeqNo =3D 0) and start a retransmission= timer,
=C2=A0 since it is its first flight.
* The server receives the ClientHello, stops the retransmission timer
=C2=A0 and sends the next flight starting with ServerHello(MsgSeqNo =3D 1)<= br> =C2=A0 since it considers the received ClientHello as an ack for the flight= .
* The client doesn't process the ServerHello, since it expects the
=C2=A0 MsgSeqNo =3D=3D 0.

Therefore the client retransmits its ClientHello and the server retransmits=
its flight containing the ServerHello. Am I missing something?

The problem is that the server has no way to figure out if the received
ClientHello is a reaction to a HelloRequest or not.
The only way out I see is that the client accepts ServerHellos with
MsgSeqNo=3D0 and MsgSeqNo=3D1.
I don't think this is covered in http://tools.ietf.org/html/rfc6347

Any opinions?

Best regards
Michael
_______________________________________________
TLS mailing list
TLS@ietf.org
htt= ps://www.ietf.org/mailman/listinfo/tls



--
Regards
<= br>Andy
--20cf302acee2263bb504e3acb215-- From Michael.Tuexen@lurchi.franken.de Sun Aug 11 10:15:32 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6940121F9A18 for ; Sun, 11 Aug 2013 10:15:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4DzafZF1-2mt for ; Sun, 11 Aug 2013 10:15:31 -0700 (PDT) Received: from mail-n.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) by ietfa.amsl.com (Postfix) with ESMTP id 37FFE11E80E0 for ; Sun, 11 Aug 2013 10:08:54 -0700 (PDT) Received: from [192.168.1.200] (p508F2769.dip0.t-ipconnect.de [80.143.39.105]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTP id E37F01C0C0692; Sun, 11 Aug 2013 19:08:50 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Michael Tuexen In-Reply-To: Date: Sun, 11 Aug 2013 19:08:56 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: <1F5455F5-439B-4215-9D92-1FDC2FDFBDE7@lurchi.franken.de> References: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> To: Andy Wilson X-Mailer: Apple Mail (2.1508) Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Aug 2013 17:15:32 -0000 On Aug 11, 2013, at 4:19 PM, Andy Wilson = wrote: > After looking over the RFC a bit, wouldn't the client be expecting a = HelloVerifyRequest after its ClientHello? I don't think this is necessary, since the client and the server have = already a relation. So there is no need to use the cookie mechanism. However, the question is the same. In your case * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission timer, since this is a flight. * The HelloRequest is dropped by the network. * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, since it is its first flight. * The server sends a HelloVerifyRequest(MsgSeqNo =3D 1) * The client doesn't process the ServerHello, since it expects the MsgSeqNo =3D=3D 0. Therefore, the server retransmits the flight consisting of the = HelloVerifyRequest and the client retransmits the flight containing the ClientHello. So the solution would be that the client accepts * ServerHellos with MsgSeqNo=3D0 and MsgSeqNo=3D1. * HelloVerifyRequest with MsgSeqNo=3D0 and MsgSeqNo=3D1. Am I missing something? Best regards Michael >=20 > On 12 August 2013 01:17, Michael Tuexen = wrote: > Dear all, >=20 > while fixing a bug in OpenSSL regarding the DTLS handshake, I thought = about > the following scenario (both sides decide to renegotiate at about the = same > time): >=20 > * A DTLS connection is established. > * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission > timer, since this is a flight. > * The HelloRequest is dropped by the network. > * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, > since it is its first flight. > * The server receives the ClientHello, stops the retransmission timer > and sends the next flight starting with ServerHello(MsgSeqNo =3D 1) > since it considers the received ClientHello as an ack for the = flight. > * The client doesn't process the ServerHello, since it expects the > MsgSeqNo =3D=3D 0. >=20 > Therefore the client retransmits its ClientHello and the server = retransmits > its flight containing the ServerHello. Am I missing something? >=20 > The problem is that the server has no way to figure out if the = received > ClientHello is a reaction to a HelloRequest or not. > The only way out I see is that the client accepts ServerHellos with > MsgSeqNo=3D0 and MsgSeqNo=3D1. > I don't think this is covered in http://tools.ietf.org/html/rfc6347 >=20 > Any opinions? >=20 > Best regards > Michael > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >=20 >=20 >=20 > --=20 > Regards >=20 > Andy From simon@josefsson.org Sun Aug 11 15:24:14 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C754321F9005 for ; Sun, 11 Aug 2013 15:24:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.599 X-Spam-Level: X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sQD5OL93LQmh for ; Sun, 11 Aug 2013 15:24:13 -0700 (PDT) Received: from duva.sjd.se (duva.sjd.se [IPv6:2001:9b0:1:1702::100]) by ietfa.amsl.com (Postfix) with ESMTP id 7FF4511E812B for ; Sun, 11 Aug 2013 15:18:56 -0700 (PDT) Received: from latte.josefsson.org (static-213-115-179-130.sme.bredbandsbolaget.se [213.115.179.130]) (authenticated bits=0) by duva.sjd.se (8.14.4/8.14.4/Debian-4) with ESMTP id r7BMIn1T016831 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 12 Aug 2013 00:18:52 +0200 From: Simon Josefsson To: Ted Krovetz References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> OpenPGP: id=B565716F; url=http://josefsson.org/key.txt X-Hashcash: 1:22:130811:tls@ietf.org::YQ6i2D9LUGMRSKX8:1ELc X-Hashcash: 1:22:130811:ted@krovetz.net::xxV2y9V8QCcziPFO:EHNf Date: Mon, 12 Aug 2013 00:18:49 +0200 In-Reply-To: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> (Ted Krovetz's message of "Mon, 29 Jul 2013 17:03:44 -1000") Message-ID: <87zjsn3m7q.fsf@latte.josefsson.org> User-Agent: Gnus/5.130008 (Ma Gnus v0.8) Emacs/24.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Virus-Scanned: clamav-milter 0.97.8 at duva.sjd.se X-Virus-Status: Clean Cc: tls@ietf.org Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Aug 2013 22:24:14 -0000 Ted Krovetz writes: > I'd also suggest using Bernstein's Chacha instead of Bernstein's > Salsa. It has the same core as Salsa, but Bernstein cleaned up the > rough edges of its prolog and epilog, making it smaller, faster and > nicer to program. Chacha is basically a better Salsa. > > http://cr.yp.to/chacha.html Right, there is a bunch of stream ciphers that have nicer properties than Salsa20, but Salsa20 was chosen conservatively from the set of modern stream cipher. Do you think the benefits of Chacha motivate ignoring the time that went into reviewing Salsa20? I'm assuming Salsa20 has received more review than Chacha, but I cannot quantify it. I would have prefered a stream cipher with builtin authentication, so we wouldn't have to debate the choice of MAC. Alas, I'm not aware of any with good performance that has gone through significant review. /Simon From prvs=1935fad10c=uri@ll.mit.edu Sun Aug 11 16:55:41 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1196B21F9A1C for ; Sun, 11 Aug 2013 16:55:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.223 X-Spam-Level: X-Spam-Status: No, score=-6.223 tagged_above=-999 required=5 tests=[AWL=-0.376, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_OBFU_ALL=0.751, UNPARSEABLE_RELAY=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E-pZJ0ib1i41 for ; Sun, 11 Aug 2013 16:55:37 -0700 (PDT) Received: from mx2.ll.mit.edu (MX2.LL.MIT.EDU [129.55.12.46]) by ietfa.amsl.com (Postfix) with ESMTP id 37BBC21F9AF5 for ; Sun, 11 Aug 2013 16:48:24 -0700 (PDT) Received: from LLE2K7-HUB02.mitll.ad.local (LLE2K7-HUB02.mitll.ad.local) by mx2.ll.mit.edu (unknown) with ESMTP id r7BNmK1A015920; Sun, 11 Aug 2013 19:48:23 -0400 From: "Blumenthal, Uri - 0558 - MITLL" To: "'simon@josefsson.org'" , "'ted@krovetz.net'" Date: Sun, 11 Aug 2013 19:40:19 -0400 Thread-Topic: [TLS] Salsa20 and Poly1305 in TLS Thread-Index: Ac6W4+e/ZC6bsxeqQQiFx0vOuoNqxAAB/aL6 In-Reply-To: <87zjsn3m7q.fsf@latte.josefsson.org> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.10.8794, 1.0.431, 0.0.0000 definitions=2013-08-11_08:2013-08-09, 2013-08-11, 1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1308110271 Message-Id: <20130811234824.37BBC21F9AF5@ietfa.amsl.com> Cc: "'tls@ietf.org'" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Aug 2013 23:55:41 -0000 Considering the similarity between Salsa and Chacha design & construction (= and the amount of analysis that went into it), IMHO Chacha advantages justi= fy its use over Salsa. Thanks! -- Regards, Uri Blumenthal Voice: (781) 981-1638 Cyber Systems and Technology Fax: (781) 981-0186 MIT Lincoln Laboratory Cell: (339) 223-5363 244 Wood Street Email: Lexington, MA 02420-9185 =20 Web: http://www.ll.mit.edu/CST/ =20 MIT LL Root CA:=20 DSN: 478-5980 ask Lincoln ext.1638 ----- Original Message ----- From: Simon Josefsson [mailto:simon@josefsson.org] Sent: Sunday, August 11, 2013 06:18 PM=0A= To: Ted Krovetz Cc: tls@ietf.org Subject: Re: [TLS] Salsa20 and Poly1305 in TLS Ted Krovetz writes: > I'd also suggest using Bernstein's Chacha instead of Bernstein's > Salsa. It has the same core as Salsa, but Bernstein cleaned up the > rough edges of its prolog and epilog, making it smaller, faster and > nicer to program. Chacha is basically a better Salsa. > > http://cr.yp.to/chacha.html Right, there is a bunch of stream ciphers that have nicer properties than Salsa20, but Salsa20 was chosen conservatively from the set of modern stream cipher. Do you think the benefits of Chacha motivate ignoring the time that went into reviewing Salsa20? I'm assuming Salsa20 has received more review than Chacha, but I cannot quantify it. I would have prefered a stream cipher with builtin authentication, so we wouldn't have to debate the choice of MAC. Alas, I'm not aware of any with good performance that has gone through significant review. /Simon _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls From ted@krovetz.net Sun Aug 11 18:14:38 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6515D11E8121 for ; Sun, 11 Aug 2013 18:14:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.349 X-Spam-Level: X-Spam-Status: No, score=-3.349 tagged_above=-999 required=5 tests=[AWL=0.250, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6q1EGhz9A15r for ; Sun, 11 Aug 2013 18:14:32 -0700 (PDT) Received: from mail-pa0-f51.google.com (mail-pa0-f51.google.com [209.85.220.51]) by ietfa.amsl.com (Postfix) with ESMTP id 2D1D211E8167 for ; Sun, 11 Aug 2013 18:06:20 -0700 (PDT) Received: by mail-pa0-f51.google.com with SMTP id lf1so4047122pab.24 for ; Sun, 11 Aug 2013 18:06:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=+2Us4szwPFTUFyJZS5BVvc/Z+d5Ch+qU6v5JEyXaMxM=; b=Q8OXHtX2t1ierThgo3nb5hUAb6RRgP+CK63pTbXLWyWvkNheZhEEMNG+7qG8FuaLnS EzljtXjBw/pwywXy5h9tOGFRyJAXz+/qNMyTrLL1TkTDJxvfHEbxR3ep/myE0VVQMnVW lefIAON+WAkQvETw5XlzAtcgerPhRlVNJMcOz+pjxedT8jNQO9H0To4P6hvdKx8JY2EG eRksDJ8oon7GETPUDMq0XQ64Gcdojr5qR+p+6+R+BbJRIT1WPxIDO8ui2R7+UrwWAyGW e3v3vzsCYxlDJzW4vU7u6izxqXXHhFwVWfxLH+l6MwminE0nNGjEg5aE3zLU/F8xVjQZ YTyA== X-Gm-Message-State: ALoCoQns66qj1K+VkotFyXGzJLz4GeAkcGhVQB8ebl7UFaq0VVXT3Aq+d/sKcPttkZUuHnHKu6X0 X-Received: by 10.66.235.105 with SMTP id ul9mr21545669pac.112.1376269578533; Sun, 11 Aug 2013 18:06:18 -0700 (PDT) Received: from [192.168.1.162] (c-67-166-145-119.hsd1.ca.comcast.net. [67.166.145.119]) by mx.google.com with ESMTPSA id r7sm36321927pao.18.2013.08.11.18.06.16 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 11 Aug 2013 18:06:17 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Ted Krovetz In-Reply-To: <87zjsn3m7q.fsf@latte.josefsson.org> Date: Sun, 11 Aug 2013 18:06:16 -0700 Content-Transfer-Encoding: quoted-printable Message-Id: <92C52D00-644F-4814-A77B-FD793FB4D676@krovetz.net> References: <23D5606B-9225-4428-99AA-EC66C93D4088@krovetz.net> <87zjsn3m7q.fsf@latte.josefsson.org> To: Simon Josefsson X-Mailer: Apple Mail (2.1508) Cc: "tls@ietf.org" Subject: Re: [TLS] Salsa20 and Poly1305 in TLS X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 01:14:38 -0000 > Do you think the benefits of Chacha motivate > ignoring the time that went into reviewing Salsa20? The nice thing about Chacha is that most of the Salsa analysis applies. = The only differences between the two algorithms is (1) the ordering of = the initial and final 16 word state, and (2) two rotation distances. I = believe that Dan Bernstein has said that he believes (1) has no security = consequences and that (2) improves security. If I were choosing between the two, yes, I'd be willing to transfer my = confidence from Salsa to Chacha and use that. -Ted From andrewgwilson@gmail.com Mon Aug 12 04:23:49 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87B1A11E81BF for ; Mon, 12 Aug 2013 04:23:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rPKkEdF1sdWB for ; Mon, 12 Aug 2013 04:23:44 -0700 (PDT) Received: from mail-bk0-x230.google.com (mail-bk0-x230.google.com [IPv6:2a00:1450:4008:c01::230]) by ietfa.amsl.com (Postfix) with ESMTP id A285121F999B for ; Mon, 12 Aug 2013 03:29:19 -0700 (PDT) Received: by mail-bk0-f48.google.com with SMTP id my13so1769626bkb.7 for ; Mon, 12 Aug 2013 03:28:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=/PK8rvd2hKpR1D37kuY/IwHfxvmuWYH0KHHJ/xK8fn4=; b=sM/ozqv8SEMq63XmumzegZ8Vj1yn9UngqMYUS2Y7Tq4ifdMq7hiA55aJBzBTdmGdO1 yj9KXSYLPfEcDpU4/BtoPywvmdUcAaju6lXfRM4hqFXSMRy4e9c9Y7JRw7qI0E7k1bHa tTpgjBw8gkA/L5Xy6UEfAYn/GKzKh3q5SoYhDFg4yzpfRvlCwhM10T97F0g0nTk1xyME oKDaNIlqY7hmId0KNfJxX4zyM7BgzWTCRXUkN6TOIEQiJKxPiFdt9aXExW0pO7fuB9vh SNUIbyX4VRkDDZi4opucPkSqd6cK4syfMDTVu2pQdWgJoJICxQRppSAnWlWuxrZmpBDq OtMg== MIME-Version: 1.0 X-Received: by 10.204.187.196 with SMTP id cx4mr3361180bkb.118.1376303336947; Mon, 12 Aug 2013 03:28:56 -0700 (PDT) Received: by 10.205.115.141 with HTTP; Mon, 12 Aug 2013 03:28:56 -0700 (PDT) In-Reply-To: <1F5455F5-439B-4215-9D92-1FDC2FDFBDE7@lurchi.franken.de> References: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> <1F5455F5-439B-4215-9D92-1FDC2FDFBDE7@lurchi.franken.de> Date: Mon, 12 Aug 2013 22:28:56 +1200 Message-ID: From: Andy Wilson To: Michael Tuexen Content-Type: multipart/alternative; boundary=20cf302acee280c18704e3bd9705 Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 11:23:49 -0000 --20cf302acee280c18704e3bd9705 Content-Type: text/plain; charset=UTF-8 Section 4.2.2 states: The first message each side transmits in each handshake always has message_seq = 0. Whenever each new message is generated, the message_seq value is incremented by one. Note that in the case of a rehandshake, this implies that the HelloRequest will have message_seq = 0 and the ServerHello will have message_seq = 1 This would imply that the client WOULD process the ServerHello with seq==1 as this is a re-handshake. That's the way i'm reading the spec.. On 12 August 2013 05:08, Michael Tuexen wrote: > On Aug 11, 2013, at 4:19 PM, Andy Wilson wrote: > > > After looking over the RFC a bit, wouldn't the client be expecting a > HelloVerifyRequest after its ClientHello? > I don't think this is necessary, since the client and the server have > already > a relation. So there is no need to use the cookie mechanism. > > However, the question is the same. In your case > * The server sends a HelloRequest(MsgSeqNo = 0) and starts the > retransmission > timer, since this is a flight. > * The HelloRequest is dropped by the network. > * The client sends a ClientHello(MsgSeqNo = 0) and start a retransmission > timer, > since it is its first flight. > * The server sends a HelloVerifyRequest(MsgSeqNo = 1) > * The client doesn't process the ServerHello, since it expects the > MsgSeqNo == 0. > > Therefore, the server retransmits the flight consisting of the > HelloVerifyRequest > and the client retransmits the flight containing the ClientHello. > So the solution would be that the client accepts > * ServerHellos with MsgSeqNo=0 and MsgSeqNo=1. > * HelloVerifyRequest with MsgSeqNo=0 and MsgSeqNo=1. > > Am I missing something? > > Best regards > Michael > > > > On 12 August 2013 01:17, Michael Tuexen < > Michael.Tuexen@lurchi.franken.de> wrote: > > Dear all, > > > > while fixing a bug in OpenSSL regarding the DTLS handshake, I thought > about > > the following scenario (both sides decide to renegotiate at about the > same > > time): > > > > * A DTLS connection is established. > > * The server sends a HelloRequest(MsgSeqNo = 0) and starts the > retransmission > > timer, since this is a flight. > > * The HelloRequest is dropped by the network. > > * The client sends a ClientHello(MsgSeqNo = 0) and start a > retransmission timer, > > since it is its first flight. > > * The server receives the ClientHello, stops the retransmission timer > > and sends the next flight starting with ServerHello(MsgSeqNo = 1) > > since it considers the received ClientHello as an ack for the flight. > > * The client doesn't process the ServerHello, since it expects the > > MsgSeqNo == 0. > > > > Therefore the client retransmits its ClientHello and the server > retransmits > > its flight containing the ServerHello. Am I missing something? > > > > The problem is that the server has no way to figure out if the received > > ClientHello is a reaction to a HelloRequest or not. > > The only way out I see is that the client accepts ServerHellos with > > MsgSeqNo=0 and MsgSeqNo=1. > > I don't think this is covered in http://tools.ietf.org/html/rfc6347 > > > > Any opinions? > > > > Best regards > > Michael > > _______________________________________________ > > TLS mailing list > > TLS@ietf.org > > https://www.ietf.org/mailman/listinfo/tls > > > > > > > > -- > > Regards > > > > Andy > > -- Regards Andy --20cf302acee280c18704e3bd9705 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Section 4.2.2 states:

The first me= ssage each side transmits in each handshake always has
=C2=A0 =C2= =A0message_seq =3D 0. =C2=A0Whenever each new message is generated, the
=C2=A0 =C2=A0message_seq value is incremented by one. =C2=A0Note tha= t in the case of a
=C2=A0 =C2=A0rehandshake, this implies that the HelloRequest will have= message_seq
=C2=A0 =C2=A0=3D 0 and the ServerHello will have mes= sage_seq =3D 1

This would imply that the cli= ent WOULD process the ServerHello with seq=3D=3D1 as this is a re-handshake= .

That's the way i'm reading the spec..




On 12 August 2013 05:08, Michael Tuexen <Michael.Tuexen@lurchi.franken.de> wrote:
On Aug 11, 2013, at 4:19 P= M, Andy Wilson <andrewgwilson= @gmail.com> wrote:

> After looking over the RFC a bit, wouldn't the client be expecting= a HelloVerifyRequest after its ClientHello?
I don't think this is necessary, since the client and the server = have already
a relation. So there is no need to use the cookie mechanism.

However, the question is the same. In your case
* The server sends a HelloRequest(MsgSeqNo =3D 0) and sta= rts the retransmission
=C2=A0 timer, since this is a flight.
* The HelloRequest is dropped by the network.
* The client sends a ClientHello(MsgSeqNo =3D 0) and start a retransmission= timer,
=C2=A0 since it is its first flight.
* The server sends a HelloVerifyRequest(MsgSeqNo =3D 1)
* The client doesn't process the ServerHello, since i= t expects the
=C2=A0 MsgSeqNo =3D=3D 0.

Therefore, the server retransmits the flight consisting of the HelloV= erifyRequest
and the client retransmits the flight containing the ClientHello.
So the solution would be that the client accepts
* ServerHellos with MsgSeqNo=3D0 and MsgSeqNo=3D1.
* HelloVerifyRequest with MsgSeqNo=3D0 and MsgSeqNo=3D1.

Am I missing something?

Best regards
Michael
>
> On 12 August 2013 01:17, Michael Tuexen <Michael.Tuexen@lurchi.franken.de> wrote: > Dear all,
>
> while fixing a bug in OpenSSL regarding the DTLS handshake, I thought = about
> the following scenario (both sides decide to renegotiate at about the = same
> time):
>
> * A DTLS connection is established.
> * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the retra= nsmission
> =C2=A0 timer, since this is a flight.
> * The HelloRequest is dropped by the network.
> * The client sends a ClientHello(MsgSeqNo =3D 0) and start a retransmi= ssion timer,
> =C2=A0 since it is its first flight.
> * The server receives the ClientHello, stops the retransmission timer<= br> > =C2=A0 and sends the next flight starting with ServerHello(MsgSeqNo = =3D 1)
> =C2=A0 since it considers the received ClientHello as an ack for the f= light.
> * The client doesn't process the ServerHello, since it expects the=
> =C2=A0 MsgSeqNo =3D=3D 0.
>
> Therefore the client retransmits its ClientHello and the server retran= smits
> its flight containing the ServerHello. Am I missing something?
>
> The problem is that the server has no way to figure out if the receive= d
> ClientHello is a reaction to a HelloRequest or not.
> The only way out I see is that the client accepts ServerHellos with > MsgSeqNo=3D0 and MsgSeqNo=3D1.
> I don't think this is covered in http://tools.ietf.org/html/rfc6347
>
> Any opinions?
>
> Best regards
> Michael
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
>
> --
> Regards
>
> Andy




--
= Regards

Andy
--20cf302acee280c18704e3bd9705-- From Michael.Tuexen@lurchi.franken.de Mon Aug 12 04:34:22 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47D8311E814C for ; Mon, 12 Aug 2013 04:34:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j33zFgpZ-2bs for ; Mon, 12 Aug 2013 04:34:20 -0700 (PDT) Received: from mail-n.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) by ietfa.amsl.com (Postfix) with ESMTP id 83BA921F9E3C for ; Mon, 12 Aug 2013 03:47:10 -0700 (PDT) Received: from [192.168.1.200] (p508F2769.dip0.t-ipconnect.de [80.143.39.105]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTP id 23E071C0C0693; Mon, 12 Aug 2013 12:46:45 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Michael Tuexen In-Reply-To: Date: Mon, 12 Aug 2013 12:46:23 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> <1F5455F5-439B-4215-9D92-1FDC2FDFBDE7@lurchi.franken.de> To: Andy Wilson X-Mailer: Apple Mail (2.1508) Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 11:34:22 -0000 On Aug 12, 2013, at 12:28 PM, Andy Wilson = wrote: > Section 4.2.2 states: >=20 > The first message each side transmits in each handshake always has > message_seq =3D 0. Whenever each new message is generated, the > message_seq value is incremented by one. Note that in the case of = a > rehandshake, this implies that the HelloRequest will have = message_seq > =3D 0 and the ServerHello will have message_seq =3D 1 >=20 > This would imply that the client WOULD process the ServerHello with = seq=3D=3D1 as this is a re-handshake. >=20 > That's the way i'm reading the spec.. Me too. I think the RFC does cover the race condition I'm referring to... What if the HelloRequest(message_seq=3D0) is lost and the client sends a ClientHello(message_seq=3D0) on its own (since the local user initates a re-handshake). The server accepts the ClientHello and responds with a ServerHello(message_seq=3D1). The client however expects a ServerHello(message_seq=3D0), since it never saw the HelloRequest. The HelloRequest is also not retransmitted, since the server considers it acked by the ClientHello. It is only the collision case I'm considering and I think which is not covered by the RFC. Best regards Michael >=20 >=20 >=20 >=20 > On 12 August 2013 05:08, Michael Tuexen = wrote: > On Aug 11, 2013, at 4:19 PM, Andy Wilson = wrote: >=20 > > After looking over the RFC a bit, wouldn't the client be expecting a = HelloVerifyRequest after its ClientHello? > I don't think this is necessary, since the client and the server have = already > a relation. So there is no need to use the cookie mechanism. >=20 > However, the question is the same. In your case > * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission > timer, since this is a flight. > * The HelloRequest is dropped by the network. > * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, > since it is its first flight. > * The server sends a HelloVerifyRequest(MsgSeqNo =3D 1) > * The client doesn't process the ServerHello, since it expects the > MsgSeqNo =3D=3D 0. >=20 > Therefore, the server retransmits the flight consisting of the = HelloVerifyRequest > and the client retransmits the flight containing the ClientHello. > So the solution would be that the client accepts > * ServerHellos with MsgSeqNo=3D0 and MsgSeqNo=3D1. > * HelloVerifyRequest with MsgSeqNo=3D0 and MsgSeqNo=3D1. >=20 > Am I missing something? >=20 > Best regards > Michael > > > > On 12 August 2013 01:17, Michael Tuexen = wrote: > > Dear all, > > > > while fixing a bug in OpenSSL regarding the DTLS handshake, I = thought about > > the following scenario (both sides decide to renegotiate at about = the same > > time): > > > > * A DTLS connection is established. > > * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission > > timer, since this is a flight. > > * The HelloRequest is dropped by the network. > > * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, > > since it is its first flight. > > * The server receives the ClientHello, stops the retransmission = timer > > and sends the next flight starting with ServerHello(MsgSeqNo =3D = 1) > > since it considers the received ClientHello as an ack for the = flight. > > * The client doesn't process the ServerHello, since it expects the > > MsgSeqNo =3D=3D 0. > > > > Therefore the client retransmits its ClientHello and the server = retransmits > > its flight containing the ServerHello. Am I missing something? > > > > The problem is that the server has no way to figure out if the = received > > ClientHello is a reaction to a HelloRequest or not. > > The only way out I see is that the client accepts ServerHellos with > > MsgSeqNo=3D0 and MsgSeqNo=3D1. > > I don't think this is covered in http://tools.ietf.org/html/rfc6347 > > > > Any opinions? > > > > Best regards > > Michael > > _______________________________________________ > > TLS mailing list > > TLS@ietf.org > > https://www.ietf.org/mailman/listinfo/tls > > > > > > > > -- > > Regards > > > > Andy >=20 >=20 >=20 >=20 > --=20 > Regards >=20 > Andy From Michael.Tuexen@lurchi.franken.de Mon Aug 12 04:39:19 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FDA321F8C66 for ; Mon, 12 Aug 2013 04:39:19 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ooaDPqO6zgfr for ; Mon, 12 Aug 2013 04:39:18 -0700 (PDT) Received: from mail-n.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) by ietfa.amsl.com (Postfix) with ESMTP id ACCFB21F9B53 for ; Mon, 12 Aug 2013 03:58:21 -0700 (PDT) Received: from [192.168.1.200] (p508F2769.dip0.t-ipconnect.de [80.143.39.105]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTP id 317FF1C0C069F; Mon, 12 Aug 2013 12:58:05 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Michael Tuexen In-Reply-To: Date: Mon, 12 Aug 2013 12:57:42 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <1CBCCCAF-163A-474B-8DD0-6634460644C1@lurchi.franken.de> <1F5455F5-439B-4215-9D92-1FDC2FDFBDE7@lurchi.franken.de> To: Andy Wilson X-Mailer: Apple Mail (2.1508) Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 11:39:19 -0000 On Aug 12, 2013, at 12:46 PM, Michael Tuexen = wrote: >=20 > On Aug 12, 2013, at 12:28 PM, Andy Wilson = wrote: >=20 >> Section 4.2.2 states: >>=20 >> The first message each side transmits in each handshake always has >> message_seq =3D 0. Whenever each new message is generated, the >> message_seq value is incremented by one. Note that in the case of = a >> rehandshake, this implies that the HelloRequest will have = message_seq >> =3D 0 and the ServerHello will have message_seq =3D 1 >>=20 >> This would imply that the client WOULD process the ServerHello with = seq=3D=3D1 as this is a re-handshake. >>=20 >> That's the way i'm reading the spec.. > Me too. >=20 > I think the RFC does cover the race condition I'm referring to... ... I meant "does NOT cover" > What if the HelloRequest(message_seq=3D0) is lost and the client sends > a ClientHello(message_seq=3D0) on its own (since the local user = initates > a re-handshake). The server accepts the ClientHello and responds with > a ServerHello(message_seq=3D1). The client however expects a > ServerHello(message_seq=3D0), since it never saw the HelloRequest. > The HelloRequest is also not retransmitted, since the server considers > it acked by the ClientHello. >=20 > It is only the collision case I'm considering and I think which is > not covered by the RFC. >=20 > Best regards > Michael >>=20 >>=20 >>=20 >>=20 >> On 12 August 2013 05:08, Michael Tuexen = wrote: >> On Aug 11, 2013, at 4:19 PM, Andy Wilson = wrote: >>=20 >>> After looking over the RFC a bit, wouldn't the client be expecting a = HelloVerifyRequest after its ClientHello? >> I don't think this is necessary, since the client and the server have = already >> a relation. So there is no need to use the cookie mechanism. >>=20 >> However, the question is the same. In your case >> * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission >> timer, since this is a flight. >> * The HelloRequest is dropped by the network. >> * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, >> since it is its first flight. >> * The server sends a HelloVerifyRequest(MsgSeqNo =3D 1) >> * The client doesn't process the ServerHello, since it expects the >> MsgSeqNo =3D=3D 0. >>=20 >> Therefore, the server retransmits the flight consisting of the = HelloVerifyRequest >> and the client retransmits the flight containing the ClientHello. >> So the solution would be that the client accepts >> * ServerHellos with MsgSeqNo=3D0 and MsgSeqNo=3D1. >> * HelloVerifyRequest with MsgSeqNo=3D0 and MsgSeqNo=3D1. >>=20 >> Am I missing something? >>=20 >> Best regards >> Michael >>>=20 >>> On 12 August 2013 01:17, Michael Tuexen = wrote: >>> Dear all, >>>=20 >>> while fixing a bug in OpenSSL regarding the DTLS handshake, I = thought about >>> the following scenario (both sides decide to renegotiate at about = the same >>> time): >>>=20 >>> * A DTLS connection is established. >>> * The server sends a HelloRequest(MsgSeqNo =3D 0) and starts the = retransmission >>> timer, since this is a flight. >>> * The HelloRequest is dropped by the network. >>> * The client sends a ClientHello(MsgSeqNo =3D 0) and start a = retransmission timer, >>> since it is its first flight. >>> * The server receives the ClientHello, stops the retransmission = timer >>> and sends the next flight starting with ServerHello(MsgSeqNo =3D 1) >>> since it considers the received ClientHello as an ack for the = flight. >>> * The client doesn't process the ServerHello, since it expects the >>> MsgSeqNo =3D=3D 0. >>>=20 >>> Therefore the client retransmits its ClientHello and the server = retransmits >>> its flight containing the ServerHello. Am I missing something? >>>=20 >>> The problem is that the server has no way to figure out if the = received >>> ClientHello is a reaction to a HelloRequest or not. >>> The only way out I see is that the client accepts ServerHellos with >>> MsgSeqNo=3D0 and MsgSeqNo=3D1. >>> I don't think this is covered in http://tools.ietf.org/html/rfc6347 >>>=20 >>> Any opinions? >>>=20 >>> Best regards >>> Michael >>> _______________________________________________ >>> TLS mailing list >>> TLS@ietf.org >>> https://www.ietf.org/mailman/listinfo/tls >>>=20 >>>=20 >>>=20 >>> -- >>> Regards >>>=20 >>> Andy >>=20 >>=20 >>=20 >>=20 >> --=20 >> Regards >>=20 >> Andy >=20 From mrex@sap.com Mon Aug 12 11:08:27 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 244C821F9E0A for ; Mon, 12 Aug 2013 11:08:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.249 X-Spam-Level: X-Spam-Status: No, score=-10.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yToxsf1sbbY7 for ; Mon, 12 Aug 2013 11:08:20 -0700 (PDT) Received: from smtpde01.sap-ag.de (smtpde01.sap-ag.de [155.56.68.170]) by ietfa.amsl.com (Postfix) with ESMTP id 45FC521F9D8D for ; Mon, 12 Aug 2013 11:08:17 -0700 (PDT) Received: from mail05.wdf.sap.corp by smtpde01.sap-ag.de (26) with ESMTP id r7CI8B5W029453 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 12 Aug 2013 20:08:11 +0200 (MEST) In-Reply-To: To: Michael Tuexen Date: Mon, 12 Aug 2013 20:08:11 +0200 (CEST) X-Mailer: ELM [version 2.4ME+ PL125 (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="US-ASCII" Message-Id: <20130812180811.779011A8FF@ld9781.wdf.sap.corp> From: mrex@sap.com (Martin Rex) X-SAP: out Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: mrex@sap.com List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 18:08:29 -0000 Michael Tuexen wrote: > > I think the RFC does not cover the race condition I'm referring to... > What if the HelloRequest(message_seq=0) is lost and the client sends > a ClientHello(message_seq=0) on its own (since the local user initates > a re-handshake). The server accepts the ClientHello and responds with > a ServerHello(message_seq=1). The client however expects a > ServerHello(message_seq=0), since it never saw the HelloRequest. > The HelloRequest is also not retransmitted, since the server considers > it acked by the ClientHello. > > It is only the collision case I'm considering and I think which is > not covered by the RFC. Your observation seems correct. The original TLS handshake is only half duplex. Properly dealing with renegotiation is therefore non-trivial. The original TLS spec addresses the overlapping of the renegotiation handshake by - omitting HelloRequests from the Handshake message hash computation. - require the TLS client to ignore any HelloRequests that are be received during the handshake (which includes the one received after the client has already requested a new handshake by sending a ClientHello from your scenario. Another "grey" area, that may not work particularly well with some TLS implementations, is what happens if one side requests a renegotiation while the other is still sending application data. While the TLS spec itself this should be OK when renegotiation handshake messages are interleaved with application data, it may not actually work with all implementations. Taken to the extreme, with TLS APIs that perform peer certificate validation in an event-based fashion, it may open a potential vulnerability (for servers doing delayed client authentication) when the client starts the renegotiation handshake, but stops sending handshake messages after the client's certificate handshake message and then continues sending application data under the original/enclosing TLS session. -Martin From turners@ieca.com Mon Aug 12 13:46:52 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E36B221F9D7B for ; Mon, 12 Aug 2013 13:46:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.788 X-Spam-Level: X-Spam-Status: No, score=-101.788 tagged_above=-999 required=5 tests=[AWL=0.477, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8ej484FpDBhH for ; Mon, 12 Aug 2013 13:46:47 -0700 (PDT) Received: from gateway02.websitewelcome.com (gateway02.websitewelcome.com [69.41.248.84]) by ietfa.amsl.com (Postfix) with ESMTP id D790521F9E26 for ; Mon, 12 Aug 2013 13:46:47 -0700 (PDT) Received: by gateway02.websitewelcome.com (Postfix, from userid 5007) id 3FBC9440A554; Mon, 12 Aug 2013 15:46:34 -0500 (CDT) Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway02.websitewelcome.com (Postfix) with ESMTP id 2CD79440A500 for ; Mon, 12 Aug 2013 15:46:34 -0500 (CDT) Received: from [96.231.225.44] (port=54485 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.80) (envelope-from ) id 1V8z0l-0002yo-DQ for tls@ietf.org; Mon, 12 Aug 2013 15:46:43 -0500 Message-ID: <520949B2.7010002@ieca.com> Date: Mon, 12 Aug 2013 16:46:42 -0400 From: Sean Turner User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: tls@ietf.org References: <20130614045028.38DBD62104@rfc-editor.org> In-Reply-To: <20130614045028.38DBD62104@rfc-editor.org> X-Forwarded-Message-Id: <20130614045028.38DBD62104@rfc-editor.org> Content-Type: multipart/mixed; boundary="------------020700070905030302050109" X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator1743.hostgator.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - ieca.com X-BWhitelist: no X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (thunderfish.local) [96.231.225.44]:54485 X-Source-Auth: sean.turner@ieca.com X-Email-Count: 5 X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20= Subject: [TLS] Fwd: [Editorial Errata Reported] RFC4492 (3652) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 20:46:53 -0000 This is a multi-part message in MIME format. --------------020700070905030302050109 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit I'm of a mind to approve this, but wanted to double check. spt -------- Original Message -------- Subject: [Editorial Errata Reported] RFC4492 (3652) Date: Thu, 13 Jun 2013 21:50:28 -0700 (PDT) From: RFC Errata System To: sblakewilson@safenet-inc.com, nelson@bolyard.com, vipul.gupta@sun.com, chris@corriente.net, bodo@openssl.org, stephen.farrell@cs.tcd.ie, turners@ieca.com, ekr@networkresonance.com, jsalowey@cisco.com, ekr@rtfm.com CC: peter.dettman@bouncycastle.org, tls@ietf.org, rfc-editor@rfc-editor.org The following errata report has been submitted for RFC4492, "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)". -------------------------------------- You may review the report below and at: http://www.rfc-editor.org/errata_search.php?rfc=4492&eid=3652 -------------------------------------- Type: Editorial Reported by: Peter Dettman Section: 5.4 Original Text ------------- ECBasisType basis; select (basis) { case ec_trinomial: opaque k <1..2^8-1>; case ec_pentanomial: opaque k1 <1..2^8-1>; opaque k2 <1..2^8-1>; opaque k3 <1..2^8-1>; }; Corrected Text -------------- ECBasisType basis; select (basis) { case ec_basis_trinomial: opaque k <1..2^8-1>; case ec_basis_pentanomial: opaque k1 <1..2^8-1>; opaque k2 <1..2^8-1>; opaque k3 <1..2^8-1>; }; Notes ----- ECBasisType is earlier introduced as: enum { ec_basis_trinomial, ec_basis_pentanomial } ECBasisType; The cases of the select statement should spell the enum elements correctly. Instructions: ------------- This errata is currently posted as "Reported". If necessary, please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party (IESG) can log in to change the status and edit the report, if necessary. -------------------------------------- RFC4492 (draft-ietf-tls-ecc-12) -------------------------------------- Title : Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Publication Date : May 2006 Author(s) : S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, B. Moeller Category : INFORMATIONAL Source : Transport Layer Security Area : Security Stream : IETF Verifying Party : IESG --------------020700070905030302050109 Content-Type: text/plain; charset=UTF-8; x-mac-type="0"; x-mac-creator="0"; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part" --------------020700070905030302050109-- From turners@ieca.com Mon Aug 12 13:49:21 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF22E21F9D7E for ; Mon, 12 Aug 2013 13:49:19 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.835 X-Spam-Level: X-Spam-Status: No, score=-101.835 tagged_above=-999 required=5 tests=[AWL=0.430, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AuYdsCo6tqe9 for ; Mon, 12 Aug 2013 13:49:14 -0700 (PDT) Received: from gateway09.websitewelcome.com (gateway09.websitewelcome.com [67.18.124.12]) by ietfa.amsl.com (Postfix) with ESMTP id 69A3F21F93BA for ; Mon, 12 Aug 2013 13:49:14 -0700 (PDT) Received: by gateway09.websitewelcome.com (Postfix, from userid 507) id 4A9EEF9A220DC; Mon, 12 Aug 2013 15:48:23 -0500 (CDT) Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway09.websitewelcome.com (Postfix) with ESMTP id 36B8BF9A2209D for ; Mon, 12 Aug 2013 15:48:23 -0500 (CDT) Received: from [96.231.225.44] (port=54488 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.80) (envelope-from ) id 1V8z3B-0003r5-Mw for tls@ietf.org; Mon, 12 Aug 2013 15:49:13 -0500 Message-ID: <52094A48.5010304@ieca.com> Date: Mon, 12 Aug 2013 16:49:12 -0400 From: Sean Turner User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: tls@ietf.org References: <20130208220123.1011DB1E004@rfc-editor.org> In-Reply-To: <20130208220123.1011DB1E004@rfc-editor.org> X-Forwarded-Message-Id: <20130208220123.1011DB1E004@rfc-editor.org> Content-Type: multipart/mixed; boundary="------------020007040908090307050802" X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator1743.hostgator.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - ieca.com X-BWhitelist: no X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (thunderfish.local) [96.231.225.44]:54488 X-Source-Auth: sean.turner@ieca.com X-Email-Count: 6 X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20= Subject: [TLS] Fwd: [Technical Errata Reported] RFC2246 (3481) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 20:49:22 -0000 This is a multi-part message in MIME format. --------------020007040908090307050802 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Yes I know this is an errata against TLS 1.0, but should it be adopted? spt -------- Original Message -------- Subject: [Technical Errata Reported] RFC2246 (3481) Date: Fri, 8 Feb 2013 14:01:22 -0800 (PST) From: RFC Errata System To: tdierks@certicom.com, pck@netcom.com, relyea@netscape.com, jar@netscape.com, msabin@netcom.com, dansimon@microsoft.com, tomw@netscape.com, hugo@watson.ibm.com, stephen.farrell@cs.tcd.ie, turners@ieca.com, ekr@networkresonance.com, jsalowey@cisco.com, ekr@rtfm.com CC: mrex@sap.com, tls@ietf.org, rfc-editor@rfc-editor.org The following errata report has been submitted for RFC2246, "The TLS Protocol Version 1.0". -------------------------------------- You may review the report below and at: http://www.rfc-editor.org/errata_search.php?rfc=2246&eid=3481 -------------------------------------- Type: Technical Reported by: Martin Rex Section: 8.1.2 Original Text ------------- 8.1.2. Diffie-Hellman A conventional Diffie-Hellman computation is performed. The negotiated key (Z) is used as the pre_master_secret, and is converted into the master_secret, as specified above. Corrected Text -------------- 8.1.2. Diffie-Hellman A conventional Diffie-Hellman computation is performed. The negotiated key (Z) is used as the pre_master_secret, and is converted into the master_secret, as specified above. Leading bytes of Z that contain all zero bits are stripped before it is used as the pre_master_secret. Notes ----- Adopting the clarification from rfc4346 Section 8.1.2. Not stripping the leading zero bits of Z will cause interop problems (handshake failures) with the installed base. Rfc2246 is still the authoritative spec for TLSv1.0. One can not implement TLSv1.0 from rfc4346. Instructions: ------------- This errata is currently posted as "Reported". If necessary, please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party (IESG) can log in to change the status and edit the report, if necessary. -------------------------------------- RFC2246 (no draft string recorded) -------------------------------------- Title : The TLS Protocol Version 1.0 Publication Date : January 1999 Author(s) : T. Dierks, C. Allen Category : PROPOSED STANDARD Source : Transport Layer Security Area : Security Stream : IETF Verifying Party : IESG --------------020007040908090307050802 Content-Type: text/plain; charset=UTF-8; x-mac-type="0"; x-mac-creator="0"; name="Attached Message Part" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="Attached Message Part" --------------020007040908090307050802-- From SRS0=66VO=RZ=acm.org=bmoeller@srs.kundenserver.de Mon Aug 12 14:13:02 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 332D421E804B for ; Mon, 12 Aug 2013 14:13:02 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.626 X-Spam-Level: X-Spam-Status: No, score=-1.626 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YE8bkcGljKnx for ; Mon, 12 Aug 2013 14:12:57 -0700 (PDT) Received: from moutng.kundenserver.de (moutng.kundenserver.de [212.227.17.10]) by ietfa.amsl.com (Postfix) with ESMTP id 6DCEA21F9FE5 for ; Mon, 12 Aug 2013 14:12:57 -0700 (PDT) Received: from mail-ob0-f170.google.com (mail-ob0-f170.google.com [209.85.214.170]) by mrelayeu.kundenserver.de (node=mrbap4) with ESMTP (Nemesis) id 0LlVhP-1Vjgwq2GxD-00bI0L; Mon, 12 Aug 2013 23:12:56 +0200 Received: by mail-ob0-f170.google.com with SMTP id eh20so7768326obb.15 for ; Mon, 12 Aug 2013 14:12:54 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=CW8xh0Yie7wegzk+W0erbc7bJkJhdz3oAhF1+B8p9Tw=; b=hMVoefydTi9z69k1Te79EZK0wNCGdCaz2McvyfgtdVvJA43A9YBkWOJ62sFdThdPRX bNLU5zxBmHaukRS0NJryqLn/tCjwRlEUToK8WptHKqU2nw+MKOte0U+ZsTsfo7WlKemf NHkzhariJhhFZZFJowvxfHwjwKLPBWnrzq5u0tNHoUSKI7TMOvjnMFdHZZhQZ1nVFuh1 a0+Rh7AqHrRgO7QAceyflg444zhprlTedagBJdfhqLgkJIKwM+CuPIBU6bvxrEltgzqp DjS5fE6uDHAzKFozEtYJgvfawYUP0VlyLmtk83Ycb7bWEazdWgYT5h6sgBRNfMYtzMas p7/Q== MIME-Version: 1.0 X-Received: by 10.182.56.197 with SMTP id c5mr3401284obq.51.1376341974301; Mon, 12 Aug 2013 14:12:54 -0700 (PDT) Received: by 10.60.172.145 with HTTP; Mon, 12 Aug 2013 14:12:54 -0700 (PDT) In-Reply-To: <520949B2.7010002@ieca.com> References: <20130614045028.38DBD62104@rfc-editor.org> <520949B2.7010002@ieca.com> Date: Mon, 12 Aug 2013 17:12:54 -0400 Message-ID: From: Bodo Moeller To: Sean Turner Content-Type: multipart/alternative; boundary=001a11c2578277c44c04e3c69658 X-Provags-ID: V02:K0:W5voySXAgvYTILQ/12ACoLh+h9Yg0f527lbjsK9tZlR oxAHB2uw+fj+W77vg0q7WggDLzMonhfiPf9526UmN9KYzbS9Wj XA/7mwDAUoqylXOIJSNMLScU5I5FcfK80Jl1zBpjg/WHtXrAvn +cJe+ihcxYi3wUvMm63G8FrukzNxBAIMuZ77HhUfWZ5SX+1IVU ZmaMZuk1N7hLhOESFslAVnJGtyFLJP8Dz0h5xKus4LU8OWhe2U J23OxrbeVq156BzK/I1H08Ibx5+L7wo0nLIsbtd4BC30w/XoLj aaYAwH7RbJ6+W432jdWNV2pvFF284A0xsZsnUOLLVZyH11r5bp GQw0iddsRRaATDVfEQYai0nPchAARmG4b0JcEfQD8KSK1dapk9 jOC0R9PCAdHFutZsqXSLr7qsg+dBZoDKqIjeZ/034cWPNEfjds ecDrQ Cc: "tls@ietf.org" Subject: Re: [TLS] Fwd: [Editorial Errata Reported] RFC4492 (3652) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 21:16:20 -0000 --001a11c2578277c44c04e3c69658 Content-Type: text/plain; charset=ISO-8859-1 The report is correct, but this is a duplicate of http://www.rfc-editor.org/errata_search.php?rfc=4492&eid=2389. Bodo On Mon, Aug 12, 2013 at 4:46 PM, Sean Turner wrote: > I'm of a mind to approve this, but wanted to double check. > > spt > > > -------- Original Message -------- > Subject: [Editorial Errata Reported] RFC4492 (3652) > Date: Thu, 13 Jun 2013 21:50:28 -0700 (PDT) > From: RFC Errata System > To: sblakewilson@safenet-inc.com, nelson@bolyard.com, vipul.gupta@sun.com, > chris@corriente.net, bodo@openssl.org, stephen.farrell@cs.tcd.ie, > turners@ieca.com, ekr@networkresonance.com, jsalowey@cisco.com, > ekr@rtfm.com > CC: peter.dettman@bouncycastle.org**, tls@ietf.org, > rfc-editor@rfc-editor.org > > The following errata report has been submitted for RFC4492, > "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer > Security (TLS)". > > ------------------------------**-------- > You may review the report below and at: > http://www.rfc-editor.org/**errata_search.php?rfc=4492&**eid=3652 > > ------------------------------**-------- > Type: Editorial > Reported by: Peter Dettman > > > > Section: 5.4 > > Original Text > ------------- > ECBasisType basis; > > select (basis) { > > case ec_trinomial: > > opaque k <1..2^8-1>; > > case ec_pentanomial: > > opaque k1 <1..2^8-1>; > > opaque k2 <1..2^8-1>; > > opaque k3 <1..2^8-1>; > > }; > > > > Corrected Text > -------------- > ECBasisType basis; > > select (basis) { > > case ec_basis_trinomial: > > opaque k <1..2^8-1>; > > case ec_basis_pentanomial: > > opaque k1 <1..2^8-1>; > > opaque k2 <1..2^8-1>; > > opaque k3 <1..2^8-1>; > > }; > > > > Notes > ----- > ECBasisType is earlier introduced as: > > enum { ec_basis_trinomial, ec_basis_pentanomial } ECBasisType; > > > > The cases of the select statement should spell the enum elements correctly. > > Instructions: > ------------- > This errata is currently posted as "Reported". If necessary, please > use "Reply All" to discuss whether it should be verified or > rejected. When a decision is reached, the verifying party (IESG) > can log in to change the status and edit the report, if necessary. > > ------------------------------**-------- > RFC4492 (draft-ietf-tls-ecc-12) > ------------------------------**-------- > Title : Elliptic Curve Cryptography (ECC) Cipher Suites for > Transport Layer Security (TLS) > Publication Date : May 2006 > Author(s) : S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, B. > Moeller > Category : INFORMATIONAL > Source : Transport Layer Security > Area : Security > Stream : IETF > Verifying Party : IESG > > > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > > --001a11c2578277c44c04e3c69658 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
The report is correct, but this is a duplicate of=A0http://www.rfc-editor.org/errata_search.php?rfc=3D4492&eid=3D2389.=

Bodo



=


On Mon,= Aug 12, 2013 at 4:46 PM, Sean Turner <turners@ieca.com> wrot= e:
I'm of a mind to approve this, but wante= d to double check.

spt


-------- Original Message --------
Subject: [Editorial Errata Reported] RFC4492 (3652)
Date: Thu, 13 Jun 2013 21:50:28 -0700 (PDT)
From: RFC Errata System <rfc-editor@rfc-editor.org>
To: sblak= ewilson@safenet-inc.com, nelson@bolyard.com, vipul.gupta@sun.com, chris@corriente.net, bodo@openssl.org, stephen.farrell@cs.tcd.ie, turners@ieca.com, ekr@networkresona= nce.com, jsalow= ey@cisco.com, ekr@rtf= m.com
CC: pet= er.dettman@bouncycastle.org, tls@ietf.org, rfc-editor@rfc-editor.org

The following errata report has been submitted for RFC4492,
"Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer S= ecurity (TLS)".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.p= hp?rfc=3D4492&eid=3D3652

--------------------------------------
Type: Editorial
Reported by: Peter Dettman <peter.dettman@bouncycastle.org>

Section: 5.4

Original Text
-------------
ECBasisType basis;

select (basis) {

=A0 =A0 case ec_trinomial:

=A0 =A0 =A0 =A0 opaque =A0k <1..2^8-1>;

=A0 =A0 case ec_pentanomial:

=A0 =A0 =A0 =A0 opaque =A0k1 <1..2^8-1>;

=A0 =A0 =A0 =A0 opaque =A0k2 <1..2^8-1>;

=A0 =A0 =A0 =A0 opaque =A0k3 <1..2^8-1>;

};



Corrected Text
--------------
ECBasisType basis;

select (basis) {

=A0 =A0 case ec_basis_trinomial:

=A0 =A0 =A0 =A0 opaque =A0k <1..2^8-1>;

=A0 =A0 case ec_basis_pentanomial:

=A0 =A0 =A0 =A0 opaque =A0k1 <1..2^8-1>;

=A0 =A0 =A0 =A0 opaque =A0k2 <1..2^8-1>;

=A0 =A0 =A0 =A0 opaque =A0k3 <1..2^8-1>;

};



Notes
-----
ECBasisType is earlier introduced as:

=A0 =A0 enum { ec_basis_trinomial, ec_basis_pentanomial } ECBasisType;



The cases of the select statement should spell the enum elements correctly.=

Instructions:
-------------
This errata is currently posted as "Reported". If necessary, plea= se
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary.

--------------------------------------
RFC4492 (draft-ietf-tls-ecc-12)
--------------------------------------
Title =A0 =A0 =A0 =A0 =A0 =A0 =A0 : Elliptic Curve Cryptography (ECC) Ciphe= r Suites for Transport Layer Security (TLS)
Publication Date =A0 =A0: May 2006
Author(s) =A0 =A0 =A0 =A0 =A0 : S. Blake-Wilson, N. Bolyard, V. Gupta, C. H= awk, B. Moeller
Category =A0 =A0 =A0 =A0 =A0 =A0: INFORMATIONAL
Source =A0 =A0 =A0 =A0 =A0 =A0 =A0: Transport Layer Security
Area =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0: Security
Stream =A0 =A0 =A0 =A0 =A0 =A0 =A0: IETF
Verifying Party =A0 =A0 : IESG




_______________________________________________
TLS mailing list
TLS@ietf.org
htt= ps://www.ietf.org/mailman/listinfo/tls


--001a11c2578277c44c04e3c69658-- From SRS0=66VO=RZ=acm.org=bmoeller@srs.kundenserver.de Mon Aug 12 14:19:33 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 722AB21F9F40 for ; Mon, 12 Aug 2013 14:19:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.642 X-Spam-Level: X-Spam-Status: No, score=-0.642 tagged_above=-999 required=5 tests=[AWL=0.984, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 65HLHPFQeMDH for ; Mon, 12 Aug 2013 14:19:27 -0700 (PDT) Received: from moutng.kundenserver.de (moutng.kundenserver.de [212.227.126.186]) by ietfa.amsl.com (Postfix) with ESMTP id 682F121F942D for ; Mon, 12 Aug 2013 14:19:27 -0700 (PDT) Received: from mail-ob0-f177.google.com (mail-ob0-f177.google.com [209.85.214.177]) by mrelayeu.kundenserver.de (node=mrbap0) with ESMTP (Nemesis) id 0MTvWL-1VZ4xj0w65-00Qnw2; Mon, 12 Aug 2013 23:19:26 +0200 Received: by mail-ob0-f177.google.com with SMTP id f8so8962698obp.8 for ; Mon, 12 Aug 2013 14:19:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=nhF9HBXRfCCVGipszqr1T4E9plrhU1380i/ZGOlS84E=; b=TNztS//Z15eNqcLOkRHSBl5wwMhi6bQdpOop0p4aLyc5k5fXFk686t2u/m45zPm01N 7BBpeXUCaYSj6CdMqakha7VPOmBDs1gv20AZqKZW9LPHo03OuNXu/0qjiPyHTFPhSSvz jkkhbe/izEfx9BJHfpl2uxnJUtHdA+HzX/Z3b/MfvoG1C188Uf+b92hMFv4Mf2YySh/f RP66nprqYV2gKkVWt7KwzsSscqAT51nar+VSog9wGInzFd0GAi9px5hum+Z/RE4Ce2wA wyExMRVKgGnr6e1F+anf8oe5n1LOfqNiq+rthYuEE53g79h6cy8D+a6bFmRfARFCgXs3 BCHw== MIME-Version: 1.0 X-Received: by 10.182.143.5 with SMTP id sa5mr262633obb.80.1376342364983; Mon, 12 Aug 2013 14:19:24 -0700 (PDT) Received: by 10.60.172.145 with HTTP; Mon, 12 Aug 2013 14:19:24 -0700 (PDT) In-Reply-To: <52094A48.5010304@ieca.com> References: <20130208220123.1011DB1E004@rfc-editor.org> <52094A48.5010304@ieca.com> Date: Mon, 12 Aug 2013 17:19:24 -0400 Message-ID: From: Bodo Moeller To: Sean Turner Content-Type: multipart/alternative; boundary=e89a8ff25464c11b9804e3c6ad5c X-Provags-ID: V02:K0:CqA42A08g4Pcmwf41oaYIsusqRQz8XxSS15zOSuEKNc EInU2S6jGeqJ+9thy2LleA83w+JmAwtPOjTaFrQt3BueoLODbJ 8VlmeY+7KDdEpnRuMPCg8t988nfsRFTFFccUN4nKjVVCUOEU0S 26TqLWdpR47jsNZtkQIgdkBtA0BGwuC78o2+s7yVTqTd9818Cz qL/3rsqxf4MRfkZ0TkSNSUtIbf9lcpof1xR698DugqVpygoL3Z Q9IFCH6E6ussJiBDm9wNyCUfeB3pfZhxeG4fUdoX3HLwcJgR6s kSMQ1oyLyiuVjFuQmyYwlIyyCtaSqFDgRuckQZymUVlydetGqu DKqCyDzqzhqzmRgvqf1HBEWWEMwJB3ZuF3NcmxO3kUnXDTK+C9 fhBHuhnrK0BASD+dFzmGLWEIC/QTF6LRApWkBFyEHskdaaqBP2 rKsTm Cc: "tls@ietf.org" Subject: Re: [TLS] Fwd: [Technical Errata Reported] RFC2246 (3481) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 21:19:33 -0000 --e89a8ff25464c11b9804e3c6ad5c Content-Type: text/plain; charset=ISO-8859-1 On Mon, Aug 12, 2013 at 4:49 PM, Sean Turner wrote: > Yes I know this is an errata against TLS 1.0, but should it be adopted? > Unless there are significant philosophical objects against adopting errata for RFCs that have already been superseded, this should be adopted. (There's an interoperable base of TLS 1.0 implementations that behave as described.) Bodo --e89a8ff25464c11b9804e3c6ad5c Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
On Mon, Aug 12, 2013 at 4:49 PM, Sean Turner <turners@ieca= .com> wrote:
Yes I know this is an errata against TLS 1.0= , but should it be adopted?

Unless ther= e are significant philosophical objects against adopting errata for RFCs th= at have already been superseded, this should be adopted. (There's an in= teroperable base of TLS 1.0 implementations that behave as described.)

Bodo


--e89a8ff25464c11b9804e3c6ad5c-- From simon@josefsson.org Mon Aug 12 14:21:13 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B63921F9F4F for ; Mon, 12 Aug 2013 14:21:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.599 X-Spam-Level: X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wYi-wjiZSYlW for ; Mon, 12 Aug 2013 14:21:12 -0700 (PDT) Received: from duva.sjd.se (duva.sjd.se [IPv6:2001:9b0:1:1702::100]) by ietfa.amsl.com (Postfix) with ESMTP id 802A621F9F44 for ; Mon, 12 Aug 2013 14:21:11 -0700 (PDT) Received: from latte.josefsson.org (static-213-115-179-130.sme.bredbandsbolaget.se [213.115.179.130]) (authenticated bits=0) by duva.sjd.se (8.14.4/8.14.4/Debian-4) with ESMTP id r7CLL4BQ011923 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 12 Aug 2013 23:21:05 +0200 From: Simon Josefsson To: Sean Turner References: <20130208220123.1011DB1E004@rfc-editor.org> <52094A48.5010304@ieca.com> OpenPGP: id=B565716F; url=http://josefsson.org/key.txt X-Hashcash: 1:22:130812:tls@ietf.org::9tV5QzYjm+JCEtSt:CUvO X-Hashcash: 1:22:130812:turners@ieca.com::9eFj5OB3vPvQl/73:DhLh Date: Mon, 12 Aug 2013 23:21:04 +0200 In-Reply-To: <52094A48.5010304@ieca.com> (Sean Turner's message of "Mon, 12 Aug 2013 16:49:12 -0400") Message-ID: <87wqnqzjun.fsf@latte.josefsson.org> User-Agent: Gnus/5.130008 (Ma Gnus v0.8) Emacs/24.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Virus-Scanned: clamav-milter 0.97.8 at duva.sjd.se X-Virus-Status: Clean Cc: tls@ietf.org Subject: Re: [TLS] Fwd: [Technical Errata Reported] RFC2246 (3481) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 21:21:13 -0000 Sean Turner writes: > Yes I know this is an errata against TLS 1.0, but should it be adopted? I think that fixing the spec for TLSv1.0 to match with what's deployed would be quite useful, but this may be opening the floodgates since there are so many issues. Perhaps a 2246bis-document to describe TLSv1.0 is an easier way to manage this. /Simon > -------- Original Message -------- > Subject: [Technical Errata Reported] RFC2246 (3481) > Date: Fri, 8 Feb 2013 14:01:22 -0800 (PST) > From: RFC Errata System > To: tdierks@certicom.com, pck@netcom.com, relyea@netscape.com, > jar@netscape.com, msabin@netcom.com, dansimon@microsoft.com, > tomw@netscape.com, hugo@watson.ibm.com, stephen.farrell@cs.tcd.ie, > turners@ieca.com, ekr@networkresonance.com, jsalowey@cisco.com, > ekr@rtfm.com > CC: mrex@sap.com, tls@ietf.org, rfc-editor@rfc-editor.org > > > The following errata report has been submitted for RFC2246, > "The TLS Protocol Version 1.0". > > -------------------------------------- > You may review the report below and at: > http://www.rfc-editor.org/errata_search.php?rfc=2246&eid=3481 > > -------------------------------------- > Type: Technical > Reported by: Martin Rex > > Section: 8.1.2 > > Original Text > ------------- > 8.1.2. Diffie-Hellman > > > > A conventional Diffie-Hellman computation is performed. The > > negotiated key (Z) is used as the pre_master_secret, and is converted > > into the master_secret, as specified above. > > > > Corrected Text > -------------- > 8.1.2. Diffie-Hellman > > > > A conventional Diffie-Hellman computation is performed. The > > negotiated key (Z) is used as the pre_master_secret, and is converted > > into the master_secret, as specified above. Leading bytes of Z that > > contain all zero bits are stripped before it is used as the > > pre_master_secret. > > > > Notes > ----- > Adopting the clarification from rfc4346 Section 8.1.2. Not stripping > the leading zero bits of Z will cause interop problems (handshake > failures) with the installed base. Rfc2246 is still the authoritative > spec for TLSv1.0. One can not implement TLSv1.0 from rfc4346. > > Instructions: > ------------- > This errata is currently posted as "Reported". If necessary, please > use "Reply All" to discuss whether it should be verified or > rejected. When a decision is reached, the verifying party (IESG) > can log in to change the status and edit the report, if necessary. > > -------------------------------------- > RFC2246 (no draft string recorded) > -------------------------------------- > Title : The TLS Protocol Version 1.0 > Publication Date : January 1999 > Author(s) : T. Dierks, C. Allen > Category : PROPOSED STANDARD > Source : Transport Layer Security > Area : Security > Stream : IETF > Verifying Party : IESG > > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls From turners@ieca.com Mon Aug 12 14:26:35 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7026721E8054 for ; Mon, 12 Aug 2013 14:26:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.874 X-Spam-Level: X-Spam-Status: No, score=-101.874 tagged_above=-999 required=5 tests=[AWL=0.390, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uNlYTzURbyMQ for ; Mon, 12 Aug 2013 14:26:22 -0700 (PDT) Received: from gateway08.websitewelcome.com (gateway08.websitewelcome.com [69.56.159.17]) by ietfa.amsl.com (Postfix) with ESMTP id 3F8FF21F9FE9 for ; Mon, 12 Aug 2013 14:26:04 -0700 (PDT) Received: by gateway08.websitewelcome.com (Postfix, from userid 5007) id 610E747A892F; Mon, 12 Aug 2013 16:25:56 -0500 (CDT) Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway08.websitewelcome.com (Postfix) with ESMTP id 540B047A88EB for ; Mon, 12 Aug 2013 16:25:56 -0500 (CDT) Received: from [96.231.225.44] (port=54586 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.80) (envelope-from ) id 1V8zci-0000bs-4L; Mon, 12 Aug 2013 16:25:56 -0500 Message-ID: <520952E3.70209@ieca.com> Date: Mon, 12 Aug 2013 17:25:55 -0400 From: Sean Turner User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Bodo Moeller References: <20130614045028.38DBD62104@rfc-editor.org> <520949B2.7010002@ieca.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator1743.hostgator.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - ieca.com X-BWhitelist: no X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (thunderfish.local) [96.231.225.44]:54586 X-Source-Auth: sean.turner@ieca.com X-Email-Count: 23 X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20= Cc: "tls@ietf.org" Subject: Re: [TLS] Fwd: [Editorial Errata Reported] RFC4492 (3652) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 21:26:35 -0000 Ack - I'm going to go ahead and mark this one verified. spt On 8/12/13 5:12 PM, Bodo Moeller wrote: > The report is correct, but this is a duplicate of > http://www.rfc-editor.org/errata_search.php?rfc=4492&eid=2389. > > Bodo > > > > > > On Mon, Aug 12, 2013 at 4:46 PM, Sean Turner > wrote: > > I'm of a mind to approve this, but wanted to double check. > > spt > > > -------- Original Message -------- > Subject: [Editorial Errata Reported] RFC4492 (3652) > Date: Thu, 13 Jun 2013 21:50:28 -0700 (PDT) > From: RFC Errata System > > To: sblakewilson@safenet-inc.com > , nelson@bolyard.com > , vipul.gupta@sun.com > , chris@corriente.net > , bodo@openssl.org > , stephen.farrell@cs.tcd.ie > , turners@ieca.com > , ekr@networkresonance.com > , jsalowey@cisco.com > , ekr@rtfm.com > CC: peter.dettman@bouncycastle.org > __, tls@ietf.org > , rfc-editor@rfc-editor.org > > > The following errata report has been submitted for RFC4492, > "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer > Security (TLS)". > > ------------------------------__-------- > You may review the report below and at: > http://www.rfc-editor.org/__errata_search.php?rfc=4492&__eid=3652 > > > ------------------------------__-------- > Type: Editorial > Reported by: Peter Dettman > > > Section: 5.4 > > Original Text > ------------- > ECBasisType basis; > > select (basis) { > > case ec_trinomial: > > opaque k <1..2^8-1>; > > case ec_pentanomial: > > opaque k1 <1..2^8-1>; > > opaque k2 <1..2^8-1>; > > opaque k3 <1..2^8-1>; > > }; > > > > Corrected Text > -------------- > ECBasisType basis; > > select (basis) { > > case ec_basis_trinomial: > > opaque k <1..2^8-1>; > > case ec_basis_pentanomial: > > opaque k1 <1..2^8-1>; > > opaque k2 <1..2^8-1>; > > opaque k3 <1..2^8-1>; > > }; > > > > Notes > ----- > ECBasisType is earlier introduced as: > > enum { ec_basis_trinomial, ec_basis_pentanomial } ECBasisType; > > > > The cases of the select statement should spell the enum elements > correctly. > > Instructions: > ------------- > This errata is currently posted as "Reported". If necessary, please > use "Reply All" to discuss whether it should be verified or > rejected. When a decision is reached, the verifying party (IESG) > can log in to change the status and edit the report, if necessary. > > ------------------------------__-------- > RFC4492 (draft-ietf-tls-ecc-12) > ------------------------------__-------- > Title : Elliptic Curve Cryptography (ECC) Cipher > Suites for Transport Layer Security (TLS) > Publication Date : May 2006 > Author(s) : S. Blake-Wilson, N. Bolyard, V. Gupta, C. > Hawk, B. Moeller > Category : INFORMATIONAL > Source : Transport Layer Security > Area : Security > Stream : IETF > Verifying Party : IESG > > > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > > From turners@ieca.com Mon Aug 12 14:27:37 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A729F21E8050 for ; Mon, 12 Aug 2013 14:27:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.907 X-Spam-Level: X-Spam-Status: No, score=-101.907 tagged_above=-999 required=5 tests=[AWL=0.358, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AQiNh9e+5iX1 for ; Mon, 12 Aug 2013 14:27:31 -0700 (PDT) Received: from gateway12.websitewelcome.com (gateway12.websitewelcome.com [67.18.88.9]) by ietfa.amsl.com (Postfix) with ESMTP id DE8EF21F9EEE for ; Mon, 12 Aug 2013 14:27:30 -0700 (PDT) Received: by gateway12.websitewelcome.com (Postfix, from userid 5007) id 8044DD127C5D6; Mon, 12 Aug 2013 16:27:14 -0500 (CDT) Received: from gator1743.hostgator.com (gator1743.hostgator.com [184.173.253.227]) by gateway12.websitewelcome.com (Postfix) with ESMTP id 5B2DBD127C502 for ; Mon, 12 Aug 2013 16:27:14 -0500 (CDT) Received: from [96.231.225.44] (port=54587 helo=thunderfish.local) by gator1743.hostgator.com with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.80) (envelope-from ) id 1V8zdy-00010q-5V; Mon, 12 Aug 2013 16:27:14 -0500 Message-ID: <52095331.4030208@ieca.com> Date: Mon, 12 Aug 2013 17:27:13 -0400 From: Sean Turner User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Bodo Moeller References: <20130208220123.1011DB1E004@rfc-editor.org> <52094A48.5010304@ieca.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator1743.hostgator.com X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - ieca.com X-BWhitelist: no X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (thunderfish.local) [96.231.225.44]:54587 X-Source-Auth: sean.turner@ieca.com X-Email-Count: 25 X-Source-Cap: ZG9tbWdyNDg7ZG9tbWdyNDg7Z2F0b3IxNzQzLmhvc3RnYXRvci5jb20= Cc: "tls@ietf.org" Subject: Re: [TLS] Fwd: [Technical Errata Reported] RFC2246 (3481) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Aug 2013 21:27:37 -0000 On 8/12/13 5:19 PM, Bodo Moeller wrote: > On Mon, Aug 12, 2013 at 4:49 PM, Sean Turner > wrote: > > Yes I know this is an errata against TLS 1.0, but should it be adopted? > > > Unless there are significant philosophical objects against adopting > errata for RFCs that have already been superseded, this should be > adopted. (There's an interoperable base of TLS 1.0 implementations that > behave as described.) Until we move an RFC historic or outright say don't use this one it's horribly broken, I think we have to keep dealing with errata. spt From Michael.Tuexen@lurchi.franken.de Tue Aug 13 04:44:54 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACA6311E815C for ; Tue, 13 Aug 2013 04:44:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uswiNGPot6xY for ; Tue, 13 Aug 2013 04:44:54 -0700 (PDT) Received: from mail-n.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) by ietfa.amsl.com (Postfix) with ESMTP id AB37B11E8153 for ; Tue, 13 Aug 2013 04:44:53 -0700 (PDT) Received: from [192.168.1.200] (p5481B5AC.dip0.t-ipconnect.de [84.129.181.172]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTP id 8E6681C0B461B; Tue, 13 Aug 2013 13:44:47 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Michael Tuexen In-Reply-To: <20130812180811.779011A8FF@ld9781.wdf.sap.corp> Date: Tue, 13 Aug 2013 13:44:47 +0200 Content-Transfer-Encoding: 7bit Message-Id: <18BBEE86-075C-4A2F-B67A-49D5F281DCFE@lurchi.franken.de> References: <20130812180811.779011A8FF@ld9781.wdf.sap.corp> To: mrex@sap.com X-Mailer: Apple Mail (2.1508) Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Aug 2013 11:44:54 -0000 On Aug 12, 2013, at 8:08 PM, Martin Rex wrote: > Michael Tuexen wrote: >> >> I think the RFC does not cover the race condition I'm referring to... >> What if the HelloRequest(message_seq=0) is lost and the client sends >> a ClientHello(message_seq=0) on its own (since the local user initates >> a re-handshake). The server accepts the ClientHello and responds with >> a ServerHello(message_seq=1). The client however expects a >> ServerHello(message_seq=0), since it never saw the HelloRequest. >> The HelloRequest is also not retransmitted, since the server considers >> it acked by the ClientHello. >> >> It is only the collision case I'm considering and I think which is >> not covered by the RFC. > > Your observation seems correct. > > The original TLS handshake is only half duplex. Properly dealing > with renegotiation is therefore non-trivial. The original TLS spec > addresses the overlapping of the renegotiation handshake by > > - omitting HelloRequests from the Handshake message hash computation. So this applies also to DTLS. > > - require the TLS client to ignore any HelloRequests that > are be received during the handshake (which includes the one > received after the client has already requested a new handshake > by sending a ClientHello from your scenario. In my scenario the client never receives it, since it is * dropped by the network * but sort of ACKed by the client by sending the ClientHello and therefore it is never retransmitted. So currently, the DTLS connection is stalled until it is taken down due to the retransmission timer firing too often... Best regards Michael > > > Another "grey" area, that may not work particularly well with > some TLS implementations, is what happens if one side requests > a renegotiation while the other is still sending application data. > > > While the TLS spec itself this should be OK when renegotiation handshake > messages are interleaved with application data, it may not actually > work with all implementations. Taken to the extreme, with TLS APIs > that perform peer certificate validation in an event-based fashion, > it may open a potential vulnerability (for servers doing delayed > client authentication) when the client starts the renegotiation > handshake, but stops sending handshake messages after the > client's certificate handshake message and then continues sending > application data under the original/enclosing TLS session. > > > -Martin > From benl@google.com Tue Aug 13 08:15:55 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A609A11E80A2 for ; Tue, 13 Aug 2013 08:15:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.223 X-Spam-Level: * X-Spam-Status: No, score=1.223 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_21=0.6, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SChnPoCQMPOt for ; Tue, 13 Aug 2013 08:15:55 -0700 (PDT) Received: from mail-qc0-x22b.google.com (mail-qc0-x22b.google.com [IPv6:2607:f8b0:400d:c01::22b]) by ietfa.amsl.com (Postfix) with ESMTP id 0293B11E814D for ; Tue, 13 Aug 2013 08:15:54 -0700 (PDT) Received: by mail-qc0-f171.google.com with SMTP id n1so1617644qcw.16 for ; Tue, 13 Aug 2013 08:15:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=KsbcBVyeiFDv02CuCT62sNbwOF4pqriYqB+vVjAvg78=; b=hjgUl2NNzdA9ZNtg6NTendEgr5mFpSHwsMIFt4KQpW3YRc3myss+qby6CXegxYoK2t pms6AYHRWP16CRoDhl9RCZM4cxNxzGfXeL3/eNAzOhT0lHLKTMIA5LCXTK1KxLuKOTOD 4cfEOcrtO3kkmdfOo++Y142fv4u35zOHYrLNN6hZWBe0oVp683K0yh+WVVlZ2qBIVTbN tJss2QIrJea2sE9vkNy9cl7Dzw9bvjlxQccy/Yn1FDnknw4ywLXEuQKMXJrvAOkHNPYy fpVcvoVZ4Tm9fmJAY7NuGPjAQGEYzUvmerS0Rlfmzfvq81MUI8Dr8BhHZLMKpnXy9jnJ eHbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=KsbcBVyeiFDv02CuCT62sNbwOF4pqriYqB+vVjAvg78=; b=EOrUhVV3TJBzemA6MBJmfrocbG48lZl9gUPqaeAIioNUYFESkI9R4Uv1vKWXBTZkYs bQgG50F+LVIpCPUhWkJg0V3tIRHeryWqlQ4BbEYNQOE7XNQc0/fNqMI2SvpMNh2TeLQQ JnItmjeSv3XWlt8BVQ0sojakWDOEjhHrmvZmF8Yey8tUl1h0zUCMWLav+WZ12GS03Fnp DqUwNMDo5DlJ5ET2Cb7uRgYJNGLsaYwWbvXXErCfgoQ5S/DFydlFLXcL6a95lZxfrsVu RxYHzFUBjRl69ycjckO1p73AaqBkEuH6E2yApQOi6Nwr84+K9R5zkR17QxkBN07qBzl9 +aeg== X-Gm-Message-State: ALoCoQlf3IMFCl7tbZ19fwICoziqeE6sr7SEGRUyo0skvaJ1ZyTcj2Ao0qK2YbHU41EWs4qbsv+VL1sEh5HENDCC+TQcn+/9g6awZ+1ln8uyeSJ6c4n5ltnuWjadi7Jgj2rGFRB3FDS7ol+ippa6pCDXjwgo1JwJ7iG8vXd8jEaTSGGzr4J3Bgelht/cELBcRztFxTDpjDZB MIME-Version: 1.0 X-Received: by 10.49.105.170 with SMTP id gn10mr5215595qeb.20.1376406954386; Tue, 13 Aug 2013 08:15:54 -0700 (PDT) Received: by 10.229.169.196 with HTTP; Tue, 13 Aug 2013 08:15:54 -0700 (PDT) Date: Tue, 13 Aug 2013 11:15:54 -0400 Message-ID: From: Ben Laurie To: "tls@ietf.org" , IETF DANE WG list , "therightkey@ietf.org" , certificate-transparency@googlegroups.com Content-Type: multipart/alternative; boundary=047d7b67845e954dd304e3d5b734 Subject: [TLS] Certificate Transparency Hack Day X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Aug 2013 15:15:55 -0000 --047d7b67845e954dd304e3d5b734 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable The Certificate Transparency hack day will take place at Google=92s London offices on Wednesday, the 28th of August, 2013. Please sign up on this form by August 22nd, to let us know you plan to attend. Where & When: The hack day will be at Google=92s offices in Belgrave House, 76 Buckingham Palace Road, London, SW1W 9TQ . Breakfast is at 8:30am, badges will be handed out at Belgrave House reception. The day itself will start with Ben=92s introduction at 9am, ending by 6pm, with a lunch break at around 1:30pm. There=92ll be drinks at a nearby pub afterwards. What to prepare: In order to make the most of the time we have on the day, you=92ll need to = do a little preparation. Please bring your own laptop with either: * A copy of the CT repository- check you have all the necessary dependencies and are able to compile it(instructions here), or * A copy of CT development Linux VMware image (available with instructions here ) Regards, Ben and the Certificate Transparency team at Google --047d7b67845e954dd304e3d5b734 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: quoted-printable

The Certificate Transparency hack day will take place at Google=92s London= offices on Wednesday, the 28th of August, 2013.

Please= sign up on this form by A= ugust 22nd, to let us know you plan to attend.


Where & When:

= The hack d= ay will be at Google=92s offices in Belgrave House, 76 Buckingham Pala= ce Road, London, SW1W 9TQ.


Breakfast= is at 8:30am, badges will be handed out at Belgrave House reception.

= The day it= self will start with Ben=92s introduction at 9am, ending by 6pm, with a lun= ch break at around 1:30pm. There=92ll be drinks at a nearby pub afterwards.=


What to prepare:

= In order t= o make the most of the time we have on the day, you=92ll need to do a littl= e preparation.

= Please bri= ng your own laptop with either:

= * A copy o= f the CT repository - check you have all the nece= ssary dependencies and are able to compile it(instructions here), or

= * A copy o= f CT development Linux VMware image (available with instructions here)


Regards,<= /span>

= Ben and th= e Certificate Transparency team at Google


<= /span>
--047d7b67845e954dd304e3d5b734-- From mrex@sap.com Tue Aug 13 14:42:08 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7278521F92C2 for ; Tue, 13 Aug 2013 14:42:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.249 X-Spam-Level: X-Spam-Status: No, score=-10.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id avfknSHhMm5A for ; Tue, 13 Aug 2013 14:42:03 -0700 (PDT) Received: from smtpde01.sap-ag.de (smtpde01.sap-ag.de [155.56.68.170]) by ietfa.amsl.com (Postfix) with ESMTP id 1C0F821F9344 for ; Tue, 13 Aug 2013 14:42:02 -0700 (PDT) Received: from mail05.wdf.sap.corp by smtpde01.sap-ag.de (26) with ESMTP id r7DLg0s5016944 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 13 Aug 2013 23:42:00 +0200 (MEST) In-Reply-To: <18BBEE86-075C-4A2F-B67A-49D5F281DCFE@lurchi.franken.de> To: Michael Tuexen Date: Tue, 13 Aug 2013 23:42:00 +0200 (CEST) X-Mailer: ELM [version 2.4ME+ PL125 (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="US-ASCII" Message-Id: <20130813214200.B3CAA1A908@ld9781.wdf.sap.corp> From: mrex@sap.com (Martin Rex) X-SAP: out Cc: tls@ietf.org Subject: Re: [TLS] DTLS Handshake race condition X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: mrex@sap.com List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Aug 2013 21:42:08 -0000 Michael Tuexen wrote: > Martin Rex wrote: >> >> The original TLS handshake is only half duplex. Properly dealing >> with renegotiation is therefore non-trivial. The original TLS spec >> addresses the overlapping of the renegotiation handshake by >> >> - omitting HelloRequests from the Handshake message hash computation. > > So this applies also to DTLS. > >> >> - require the TLS client to ignore any HelloRequests that >> are be received during the handshake (which includes the one >> received after the client has already requested a new handshake >> by sending a ClientHello from your scenario. > > In my scenario the client never receives it, since it is > * dropped by the network > * but sort of ACKed by the client by sending the ClientHello and > therefore it is never retransmitted. > So currently, the DTLS connection is stalled until it is taken > down due to the retransmission timer firing too often... If HelloRequest changes the DTLS MsgSeqNo, then simply "ignoring it" seems no longer an option (that it was in TLS). Ignoring it was really supposed to mean "will not affect state". MsgSeqNo. looks like state that is relevant to the DTLS handshake state machine. In case the server _did_ send a HelloRequest, would glueing/prefixing another HelloRequest to the front of the HelloVerifyRequest help? -Martin From internet-drafts@ietf.org Thu Aug 15 14:50:17 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F229721F9A74; Thu, 15 Aug 2013 14:50:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.586 X-Spam-Level: X-Spam-Status: No, score=-102.586 tagged_above=-999 required=5 tests=[AWL=0.014, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RdBB6ZegHJef; Thu, 15 Aug 2013 14:50:15 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2307821F9991; Thu, 15 Aug 2013 14:50:15 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: internet-drafts@ietf.org To: i-d-announce@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 4.70.p1 Message-ID: <20130815215015.23194.22653.idtracker@ietfa.amsl.com> Date: Thu, 15 Aug 2013 14:50:15 -0700 Cc: tls@ietf.org Subject: [TLS] I-D Action: draft-ietf-tls-pwd-01.txt X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Aug 2013 21:50:17 -0000 A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the Transport Layer Security Working Group of= the IETF. Title : Secure Password Ciphersuites for Transport Layer Securit= y (TLS) Author(s) : Dan Harkins Dave Halasz Filename : draft-ietf-tls-pwd-01.txt Pages : 24 Date : 2013-08-15 Abstract: This memo defines several new ciphersuites for the Transport Layer Security (TLS) protocol to support certificate-less, secure authentication using only a simple, low-entropy, password. The ciphersuites are all based on an authentication and key exchange protocol that is resistant to off-line dictionary attack. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-tls-pwd There's also a htmlized version available at: http://tools.ietf.org/html/draft-ietf-tls-pwd-01 A diff from the previous version is available at: http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-tls-pwd-01 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From jsalowey@cisco.com Thu Aug 15 15:28:06 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3193C11E8210 for ; Thu, 15 Aug 2013 15:28:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -110.599 X-Spam-Level: X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FF3MZJERtIJ1 for ; Thu, 15 Aug 2013 15:28:01 -0700 (PDT) Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) by ietfa.amsl.com (Postfix) with ESMTP id 2E5BE11E81B9 for ; Thu, 15 Aug 2013 15:28:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=275; q=dns/txt; s=iport; t=1376605681; x=1377815281; h=from:to:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=MDC2PePYqie1al6B3abU2m3kZDxglzALV+V1wrjAP4g=; b=UKrOIc4wzSnmPa5B7EIbHOWO04hcv3ELuwafMJ4ew5wisH/82RurhF6o OK3O4OdD/OE08qBx1i2wwqBnW4FQdpWwKq6JmP0xtko+YuL7A9pCT8ZGn OBnb4rXI0svXYTseZ9NyymjlDlvb35UGaCzs2OfMepCQsIPtpBswVauAP E=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgIFANJUDVKtJXHA/2dsb2JhbABbgwY1UL8VgSMWdIImAQQdHVEBKhRCJwQbiAgMmXSgKpAfg1N3A5kRkCWDG4Iq X-IronPort-AV: E=Sophos;i="4.89,889,1367971200"; d="scan'208";a="247717015" Received: from rcdn-core2-5.cisco.com ([173.37.113.192]) by rcdn-iport-1.cisco.com with ESMTP; 15 Aug 2013 22:28:00 +0000 Received: from xhc-aln-x05.cisco.com (xhc-aln-x05.cisco.com [173.36.12.79]) by rcdn-core2-5.cisco.com (8.14.5/8.14.5) with ESMTP id r7FMS03r018435 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for ; Thu, 15 Aug 2013 22:28:00 GMT Received: from xmb-rcd-x09.cisco.com ([169.254.9.136]) by xhc-aln-x05.cisco.com ([173.36.12.79]) with mapi id 14.02.0318.004; Thu, 15 Aug 2013 17:28:00 -0500 From: "Joseph Salowey (jsalowey)" To: "" Thread-Topic: Start of Working Group Last Call for ALPN (draft-ietf-tls-applayerprotoneg-01) Thread-Index: AQHOmgayI7Fz7QRaikC2dRjq1euU/Q== Date: Thu, 15 Aug 2013 22:27:59 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.33.248.54] Content-Type: text/plain; charset="us-ascii" Content-ID: <61079803DB73EB4DBA5DC6DFCFC99477@emea.cisco.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: [TLS] Start of Working Group Last Call for ALPN (draft-ietf-tls-applayerprotoneg-01) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Aug 2013 22:28:06 -0000 This is the working group last call for draft-ietf-tls-applayerprotoneg-01.= Please send your reviews and comments to the TLS list by September 6, 2013= . =20 The draft can be found at http://tools.ietf.org/html/draft-ietf-tls-applaye= rprotoneg-01 Thanks, Joe From paul.hoffman@vpnc.org Sat Aug 17 18:18:13 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCE1511E8183 for ; Sat, 17 Aug 2013 18:18:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.307 X-Spam-Level: X-Spam-Status: No, score=-102.307 tagged_above=-999 required=5 tests=[AWL=0.292, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RVI7dwMsao45 for ; Sat, 17 Aug 2013 18:18:13 -0700 (PDT) Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id C04AD11E8158 for ; Sat, 17 Aug 2013 18:18:12 -0700 (PDT) Received: from [10.20.30.90] (50-1-98-185.dsl.dynamic.sonic.net [50.1.98.185]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.5) with ESMTP id r7I1I8r9093018 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Sat, 17 Aug 2013 18:18:11 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) X-Authentication-Warning: hoffman.proper.com: Host 50-1-98-185.dsl.dynamic.sonic.net [50.1.98.185] claimed to be [10.20.30.90] Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Paul Hoffman In-Reply-To: Date: Sat, 17 Aug 2013 18:18:08 -0700 Content-Transfer-Encoding: quoted-printable Message-Id: References: To: "tls@ietf.org" X-Mailer: Apple Mail (2.1508) Subject: Re: [TLS] Start of Working Group Last Call for ALPN (draft-ietf-tls-applayerprotoneg-01) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Aug 2013 01:18:13 -0000 I have reviewed the -01 version of the document and it looks ready for = standardization. --Paul Hoffman= From martin.thomson@gmail.com Mon Aug 19 11:04:03 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C6FB11E82CC for ; Mon, 19 Aug 2013 11:04:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.51 X-Spam-Level: X-Spam-Status: No, score=-3.51 tagged_above=-999 required=5 tests=[AWL=1.090, BAYES_00=-2.599, GB_I_LETTER=-2, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id okBxpXXYNYJ9 for ; Mon, 19 Aug 2013 11:04:02 -0700 (PDT) Received: from mail-wg0-x22f.google.com (mail-wg0-x22f.google.com [IPv6:2a00:1450:400c:c00::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 73AF011E82C7 for ; Mon, 19 Aug 2013 11:04:02 -0700 (PDT) Received: by mail-wg0-f47.google.com with SMTP id j13so3727694wgh.2 for ; Mon, 19 Aug 2013 11:04:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=trHWLh4/3tU+Rkqvg4RFA6VhvAsba8PGU361UdIK6vs=; b=QHdGCjjrTAeGzSy86tR6zXQlnoCc0GOPR2MgfQI6NinVFbZp1PkjjcQJ4v6+3Cu9zO jEo6mLZBllTMh4ztR8/Hu2uRCARNncLaTccBEsdfCoRGnOalq0Gw62inK4bmfvWeeuM7 zXdMSQU7vUY6YiJalZhx7Y0vvZcIfjO0MdLVAiDopoLBXrNMmmbQdUrPKUlCCXKRqkqF AyX64vlDC7oSjsQNeQ10zwx1OwaVYDqtUC54Uygxh34FHwyF4WJG2leEjOLW4wPFd4Ub n2kgbnk3UenBQvwKQePaI5+K1pz6Yvbd2Zdmv0EPRKV4+ram3o5cn4SvscTow0U7+K3T uvlQ== MIME-Version: 1.0 X-Received: by 10.180.183.19 with SMTP id ei19mr9237159wic.10.1376935441596; Mon, 19 Aug 2013 11:04:01 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Mon, 19 Aug 2013 11:04:01 -0700 (PDT) Date: Mon, 19 Aug 2013 11:04:01 -0700 Message-ID: From: Martin Thomson To: tls@ietf.org Content-Type: text/plain; charset=UTF-8 Subject: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Aug 2013 18:04:03 -0000 I have read the draft and think that it is largely ready for publication, though there are a few minor issues that should be resolved regarding application strings. (I sent some of these comments to the authors privately.) Can I request that when you create the registry in ALPN that you do not register HTTP/2.0? More likely than not, ALPN will precede HTTP/2.0 and I want to avoid having a dependency issue, particularly if we find that we need to change the string for some reason. I'm also a little concerned about the existence of a registration for HTTP/1.1, particularly when that registration differs from the string used in the protocol itself (even if only in letter case). Have the authors consulted the HTTPbis working group about these registrations? The other issue is the definition of the 'exp' prefix. RFC 6648 advises against defining such constructs. I would prefer if this prefix were not defined. From Andrei.Popov@microsoft.com Mon Aug 19 16:18:16 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79F6E11E818D for ; Mon, 19 Aug 2013 16:18:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.599 X-Spam-Level: X-Spam-Status: No, score=-5.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fl9JNifLehhq for ; Mon, 19 Aug 2013 16:18:12 -0700 (PDT) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2lp0238.outbound.protection.outlook.com [207.46.163.238]) by ietfa.amsl.com (Postfix) with ESMTP id 2CD4B11E8172 for ; Mon, 19 Aug 2013 16:18:11 -0700 (PDT) Received: from BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) by BL2PR03MB195.namprd03.prod.outlook.com (10.255.230.153) with Microsoft SMTP Server (TLS) id 15.0.745.25; Mon, 19 Aug 2013 23:18:10 +0000 Received: from BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.159]) by BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.218]) with mapi id 15.00.0745.000; Mon, 19 Aug 2013 23:18:09 +0000 From: Andrei Popov To: Martin Thomson , "tls@ietf.org" Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaaN1TNnQyJLEe2jldO/oM6xJmdHa2A Date: Mon, 19 Aug 2013 23:18:09 +0000 Message-ID: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [2001:4898:80e0:ed43::4] x-forefront-prvs: 09435FCA72 x-forefront-antispam-report: SFV:NSPM; SFS:(13464003)(199002)(189002)(377454003)(164054003)(51856001)(65816001)(59766001)(80022001)(74366001)(46102001)(77982001)(47976001)(19580405001)(19580385001)(83322001)(76796001)(33646001)(19580395003)(81816001)(81686001)(76786001)(76576001)(63696002)(83072001)(49866001)(53806001)(79102001)(74316001)(31966008)(81542001)(4396001)(69226001)(74876001)(56776001)(54356001)(47736001)(56816003)(80976001)(74706001)(50986001)(47446002)(54316002)(77096001)(76482001)(74502001)(74662001)(81342001)(24736002)(3826001); DIR:OUT; SFP:; SCL:1; SRVR:BL2PR03MB195; H:BL2PR03MB194.namprd03.prod.outlook.com; CLIP:2001:4898:80e0:ed43::4; RD:InfoNoRecords; A:1; MX:1; LANG:en; Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: DuplicateDomain-a84fc36a-4ed7-4e57-ab1c-3e967bcbad48.microsoft.com X-MS-Exchange-CrossPremises-AuthAs: Internal X-MS-Exchange-CrossPremises-AuthMechanism: 03 X-MS-Exchange-CrossPremises-AuthSource: BL2PR03MB194.namprd03.prod.outlook.com X-MS-Exchange-CrossPremises-SCL: 1 X-MS-Exchange-CrossPremises-messagesource: StoreDriver X-MS-Exchange-CrossPremises-BCC: X-MS-Exchange-CrossPremises-originalclientipaddress: 2001:4898:80e0:ed43::4 X-MS-Exchange-CrossPremises-avstamp-service: 1.0 X-MS-Exchange-CrossPremises-antispam-scancontext: DIR:Originating; SFV:NSPM; SKIP:0; X-MS-Exchange-CrossPremises-processed-by-journaling: Journal Agent X-MS-Exchange-CrossPremises-ContentConversionOptions: False; 00160000; True; ; iso-8859-1 X-OrganizationHeadersPreserved: BL2PR03MB195.namprd03.prod.outlook.com Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Aug 2013 23:18:16 -0000 1. If the HTTP WG has reservations about registering an HTTP/2.0 protocol I= D at this time, perhaps we should remove it from the draft. New protocol ID= registrations will need to be added in the future, and HTTP/2.0 could be a= mong them. 2. ALPN defines protocol IDs as opaque byte strings, although the currently= proposed protocol IDs consist of printable characters, for easy debugging,= etc. ALPN protocol IDs are not meant to be displayed to the end user. I wo= uld prefer to keep the HTTP/1.1 protocol ID registration in the draft becau= se it makes ALPN immediately useable for negotiating HTTP and SPDY connecti= ons. 3. The experimental namespace was requested by several TLS WG participants;= it would be great if they could share their opinions of RFC 6648 section 3= "Recommendations for Creators of New Parameters". Thanks, Andrei -----Original Message----- From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Marti= n Thomson Sent: Monday, August 19, 2013 11:04 AM To: tls@ietf.org Subject: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 I have read the draft and think that it is largely ready for publication, t= hough there are a few minor issues that should be resolved regarding applic= ation strings. (I sent some of these comments to the authors privately.) Can I request that when you create the registry in ALPN that you do not reg= ister HTTP/2.0? More likely than not, ALPN will precede HTTP/2.0 and I want to avoid having a dependency issue, particularly if we = find that we need to change the string for some reason. I'm also a little concerned about the existence of a registration for HTTP/= 1.1, particularly when that registration differs from the string used in th= e protocol itself (even if only in letter case). Have the authors consulte= d the HTTPbis working group about these registrations? The other issue is the definition of the 'exp' prefix. RFC 6648 advises ag= ainst defining such constructs. I would prefer if this prefix were not def= ined. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls From martin.thomson@gmail.com Mon Aug 19 17:13:47 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4DBC11E81CF for ; Mon, 19 Aug 2013 17:13:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.609 X-Spam-Level: X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.009, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yLwNdZ+hgB+e for ; Mon, 19 Aug 2013 17:13:47 -0700 (PDT) Received: from mail-we0-x234.google.com (mail-we0-x234.google.com [IPv6:2a00:1450:400c:c03::234]) by ietfa.amsl.com (Postfix) with ESMTP id 2E49D11E81A6 for ; Mon, 19 Aug 2013 17:13:46 -0700 (PDT) Received: by mail-we0-f180.google.com with SMTP id p61so4488441wes.11 for ; Mon, 19 Aug 2013 17:13:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=AED2DNeQ4X5KGkJtEAvxaQIQWnReW8N7Q+zr63CTCwU=; b=IoCZSxLEgFIYc4wKG8rp7B8jFI40TlUgt65KPpLZCXZOH7e1PFmHki3tbZTZu+p1K4 Xp+wysq1xo8ej5iLH1d1ii1A8P9fjaW6VmfPLp9o2OwzUHwQaNYefSXgIcBsVkg7uFVp hea5Z/GMU/0UmxjZjs3o1qc6FuO31KQE97AFpMkTiE7N1VYVHO4pRTWvpc0goeknsXJD iBOJeCaQ6vnpHk9Y2FHOqK5KrDhs13k0hsr+/XJiSLTgyhb/SNXEl4Z6+un//ShE+nUw Z2yh4Ta5A0Dtaq90blxDZCVBIsY6zlL/Nxnil0eUpGHy/PXS0vkL1yf2RLdX3D5989iH yTGw== MIME-Version: 1.0 X-Received: by 10.180.126.97 with SMTP id mx1mr10289245wib.10.1376957626298; Mon, 19 Aug 2013 17:13:46 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Mon, 19 Aug 2013 17:13:46 -0700 (PDT) In-Reply-To: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> Date: Mon, 19 Aug 2013 17:13:46 -0700 Message-ID: From: Martin Thomson To: Andrei Popov Content-Type: text/plain; charset=UTF-8 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 00:13:48 -0000 On 19 August 2013 16:18, Andrei Popov wrote: > I would prefer to keep the HTTP/1.1 protocol ID registration in the draft because it makes ALPN immediately useable for negotiating HTTP and SPDY connections. I have no problem with that. I do worry about the fact that this is lowercase. HTTP/1.1 self identifies as "HTTP/1.1" (i.e., uppercase), whereas ALPN uses "http/1.1", which will cause issues (I can say "will" rather than "might" because that was an issue we had with the HTTP/2.0 identification string). Is there any reason that this is not the same string that HTTP/1.1 uses? From tom@ritter.vg Mon Aug 19 20:35:35 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BEB511E80E7 for ; Mon, 19 Aug 2013 20:35:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.978 X-Spam-Level: X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oAdRSIUeSRTJ for ; Mon, 19 Aug 2013 20:35:34 -0700 (PDT) Received: from mail-pd0-x22c.google.com (mail-pd0-x22c.google.com [IPv6:2607:f8b0:400e:c02::22c]) by ietfa.amsl.com (Postfix) with ESMTP id 968C811E8155 for ; Mon, 19 Aug 2013 20:35:32 -0700 (PDT) Received: by mail-pd0-f172.google.com with SMTP id z10so6093718pdj.3 for ; Mon, 19 Aug 2013 20:35:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ritter.vg; s=vg; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; bh=w2qBr5QVLl8O+YWIgOBqUa8L2hSdTbWHk1RpSNmRuno=; b=W0/eZaqXDFui8bBmLvsvrD+FG20GDUC1z4lAzvU5/MJ/sb1JCnY3LkZJAjtqjmhTN5 yKAFDvZ41Hve9KLJXpOteAqrh5GXYuLakTn217Nlvev+1c5WecsK0KjfBUt+Psi6Kuuf 9MxZtvg+jcuH+HuSM0eqiTDk6d3jUkwTb3S2o= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:content-type; bh=w2qBr5QVLl8O+YWIgOBqUa8L2hSdTbWHk1RpSNmRuno=; b=Sg7k+/LodM68LqGhen9uvHg20kLTwIM8/rHlr69zmvZK6DHFzvdbSAGLyP0dc3P3p9 u8Llm4EHyW4U7FhYiVmENHbPQLO7TYodTq7KJ6JsyGf2ve42HEnFZXnlVWK4IXveCWB4 kPAxjMIUP75aGShNv48KXGhuKOcLikr+jzHVtk4KhCsgIMS65t4HaQpXb6PqHHPCnfVb K/An/rHZNwvBt6SL5wN9OhZFAp68Rk8lib71hVTCssSXDW0br9U8QKo/+oUeMxEh1hDY J4TyUKe+GNpciDSQyUp35SOyhxmG5pRbJ0S65eTuOFx2yAtJk5Xn3n3QUmpm/9Navvxp bzVw== X-Gm-Message-State: ALoCoQmRzeu+RFQ1m0BTfIM3NGjVSeqI+hBKN9HqlbV/ymMlwJ1FAM6OM4SiwH19GVdf+Lb4xWI+ X-Received: by 10.66.4.6 with SMTP id g6mr1164150pag.96.1376969732424; Mon, 19 Aug 2013 20:35:32 -0700 (PDT) MIME-Version: 1.0 Received: by 10.68.129.3 with HTTP; Mon, 19 Aug 2013 20:35:12 -0700 (PDT) In-Reply-To: References: From: Tom Ritter Date: Mon, 19 Aug 2013 23:35:12 -0400 Message-ID: To: "tls@ietf.org" Content-Type: text/plain; charset=ISO-8859-1 Subject: Re: [TLS] Start of Working Group Last Call for ALPN (draft-ietf-tls-applayerprotoneg-01) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 03:35:35 -0000 I found a single typo: In Section 4, there is a repeated 'the': the the ability to hide the negotiated protocol Other than that, I cannot think of anything. -tom From ynir@checkpoint.com Mon Aug 19 22:54:41 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B685A11E81BE for ; Mon, 19 Aug 2013 22:54:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -11.566 X-Spam-Level: X-Spam-Status: No, score=-11.566 tagged_above=-999 required=5 tests=[AWL=1.033, BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nRopd2remEUl for ; Mon, 19 Aug 2013 22:54:37 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id E35E211E81B0 for ; Mon, 19 Aug 2013 22:54:36 -0700 (PDT) Received: from DAG-EX10.ad.checkpoint.com ([194.29.34.150]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7K5sXkI021764; Tue, 20 Aug 2013 08:54:33 +0300 X-CheckPoint: {52130499-B-1B221DC2-1FFFF} Received: from IL-EX10.ad.checkpoint.com ([169.254.2.105]) by DAG-EX10.ad.checkpoint.com ([169.254.3.223]) with mapi id 14.02.0342.003; Tue, 20 Aug 2013 08:54:32 +0300 From: Yoav Nir To: Andrei Popov Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABuHQA= Date: Tue, 20 Aug 2013 05:54:33 +0000 Message-ID: <7F46F059-63FA-4ABB-9176-68345DA5398B@checkpoint.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> In-Reply-To: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.31.21.143] x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: Clean x-cpdlp: 11053508e80f909503dc8c4700bdf18505370cfed4 Content-Type: text/plain; charset="us-ascii" Content-ID: <0B83FDA9C80E64409724E3CAE639C1E6@ad.checkpoint.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 05:54:41 -0000 On Aug 20, 2013, at 2:18 AM, Andrei Popov wrot= e: > 1. If the HTTP WG has reservations about registering an HTTP/2.0 protocol= ID at this time, perhaps we should remove it from the draft. New protocol = ID registrations will need to be added in the future, and HTTP/2.0 could be= among them. I have no problem with having HTTP/2.0 there now, as long as we're all clea= r that this does not relate to draft-ietf-httpbis-http2-xx, but only to the= protocol in the eventual RFC. > 2. ALPN defines protocol IDs as opaque byte strings, although the current= ly proposed protocol IDs consist of printable characters, for easy debuggin= g, etc. ALPN protocol IDs are not meant to be displayed to the end user. I = would prefer to keep the HTTP/1.1 protocol ID registration in the draft bec= ause it makes ALPN immediately useable for negotiating HTTP and SPDY connec= tions. It's not meant to be displayed to the end user, as in my mother surfing the= web. But it's nice to be able to see a recognizable string in Wireshark. S= o yes, keep HTTP/1.1 (and HTTP/2.0). SPDY, however, should be experimental = or some such. There's no reason to keep it in the registry forever, or plac= e it in the registry in the first place. > 3. The experimental namespace was requested by several TLS WG participant= s; it would be great if they could share their opinions of RFC 6648 section= 3 "Recommendations for Creators of New Parameters". I agree with the RFC. I prefer a private space that has an "owner". So we c= ould have "Priv-GOOG-SPDY4" and "Priv-CHKP-SNX" and "Priv-MSFT-SSTP", where= we don't have IANA keeping things pure and non-conflicting, but having an = org name there can do. And yes, I can do a "Priv-yoavnir-foo", and hope thi= s doesn't become an identifier for some major consulting company [1]. We also need something for IETF internal drafts, so I would recommend using= the draft name including numbers (as in "draft-ietf-tls-applayerprotoneg-0= 1"). Just reserve the names without hyphens to standards track, and require= registration for those only. Yoav [1] http://www.yoavnir.com (not me!) > Thanks, >=20 > Andrei >=20 > -----Original Message----- > From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Mar= tin Thomson > Sent: Monday, August 19, 2013 11:04 AM > To: tls@ietf.org > Subject: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 >=20 > I have read the draft and think that it is largely ready for publication,= though there are a few minor issues that should be resolved regarding appl= ication strings. >=20 > (I sent some of these comments to the authors privately.) >=20 > Can I request that when you create the registry in ALPN that you do not r= egister HTTP/2.0? More likely than not, ALPN will precede > HTTP/2.0 and I want to avoid having a dependency issue, particularly if w= e find that we need to change the string for some reason. >=20 > I'm also a little concerned about the existence of a registration for HTT= P/1.1, particularly when that registration differs from the string used in = the protocol itself (even if only in letter case). Have the authors consul= ted the HTTPbis working group about these registrations? >=20 > The other issue is the definition of the 'exp' prefix. RFC 6648 advises = against defining such constructs. I would prefer if this prefix were not d= efined. > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >=20 > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls From ynir@checkpoint.com Mon Aug 19 22:54:41 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C757211E81BF for ; Mon, 19 Aug 2013 22:54:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -11.63 X-Spam-Level: X-Spam-Status: No, score=-11.63 tagged_above=-999 required=5 tests=[AWL=0.969, BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 97JxAPynUh0H for ; Mon, 19 Aug 2013 22:54:37 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id E3B2111E81B4 for ; Mon, 19 Aug 2013 22:54:36 -0700 (PDT) Received: from DAG-EX10.ad.checkpoint.com ([194.29.34.150]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7K5sWvg021751; Tue, 20 Aug 2013 08:54:32 +0300 X-CheckPoint: {52130498-5-1B221DC2-1FFFF} Received: from IL-EX10.ad.checkpoint.com ([169.254.2.105]) by DAG-EX10.ad.checkpoint.com ([169.254.3.223]) with mapi id 14.02.0342.003; Tue, 20 Aug 2013 08:54:31 +0300 From: Yoav Nir To: Andrei Popov Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABs+YA= Date: Tue, 20 Aug 2013 05:54:31 +0000 Message-ID: <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> In-Reply-To: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.31.21.143] x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: Clean x-cpdlp: 11e1c2042390e42ff1eb99bb1e9d4272745596e58a Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 05:54:41 -0000 On Aug 20, 2013, at 2:18 AM, Andrei Popov wrot= e: > 1. If the HTTP WG has reservations about registering an HTTP/2.0 protocol= ID at this time, perhaps we should remove it from the draft. New protocol = ID registrations will need to be added in the future, and HTTP/2.0 could be= among them. I have no problem with having HTTP/2.0 there now, as long as we're all clea= r that this does not relate to draft-ietf-httpbis-http2-xx, but only to the= protocol in the eventual RFC. > 2. ALPN defines protocol IDs as opaque byte strings, although the current= ly proposed protocol IDs consist of printable characters, for easy debuggin= g, etc. ALPN protocol IDs are not meant to be displayed to the end user. I = would prefer to keep the HTTP/1.1 protocol ID registration in the draft bec= ause it makes ALPN immediately useable for negotiating HTTP and SPDY connec= tions. It's not meant to be displayed to the end user, as in my mother surfing the= web. But it's nice to be able to see a recognizable string in Wireshark. S= o yes, keep HTTP/1.1 (and HTTP/2.0). SPDY, however, should be experimental = or some such. There's no reason to keep it in the registry forever, or plac= e it in the registry in the first place. > 3. The experimental namespace was requested by several TLS WG participant= s; it would be great if they could share their opinions of RFC 6648 section= 3 "Recommendations for Creators of New Parameters". I agree with the RFC. I prefer a private space that has an "owner". So we c= ould have "Priv-GOOG-SPDY4" and "Priv-CHKP-SNX" and "Priv-MSFT-SSTP", where= we don't have IANA keeping things pure and non-conflicting, but having an = org name there can do. And yes, I can do a "Priv-yoavnir-foo", and hope thi= s doesn't become an identifier for some major consulting company [1]. We also need something for IETF internal drafts, so I would recommend using= the draft name including numbers (as in "draft-ietf-tls-applayerprotoneg-0= 1"). Just reserve the names without hyphens to standards track, and require= registration for those only. Yoav [1] http://www.yoavnir.com (not me!) > Thanks, >=20 > Andrei >=20 > -----Original Message----- > From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Mar= tin Thomson > Sent: Monday, August 19, 2013 11:04 AM > To: tls@ietf.org > Subject: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 >=20 > I have read the draft and think that it is largely ready for publication,= though there are a few minor issues that should be resolved regarding appl= ication strings. >=20 > (I sent some of these comments to the authors privately.) >=20 > Can I request that when you create the registry in ALPN that you do not r= egister HTTP/2.0? More likely than not, ALPN will precede > HTTP/2.0 and I want to avoid having a dependency issue, particularly if w= e find that we need to change the string for some reason. >=20 > I'm also a little concerned about the existence of a registration for HTT= P/1.1, particularly when that registration differs from the string used in = the protocol itself (even if only in letter case). Have the authors consul= ted the HTTPbis working group about these registrations? >=20 > The other issue is the definition of the 'exp' prefix. RFC 6648 advises = against defining such constructs. I would prefer if this prefix were not d= efined. > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >=20 > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls From rsalz@akamai.com Tue Aug 20 07:03:11 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8CCF411E80E4 for ; Tue, 20 Aug 2013 07:03:11 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hzCkSfSLPnJS for ; Tue, 20 Aug 2013 07:03:06 -0700 (PDT) Received: from prod-mail-xrelay06.akamai.com (prod-mail-xrelay06.akamai.com [96.6.114.98]) by ietfa.amsl.com (Postfix) with ESMTP id 5F24E11E80D9 for ; Tue, 20 Aug 2013 07:03:06 -0700 (PDT) Received: from prod-mail-xrelay06.akamai.com (localhost.localdomain [127.0.0.1]) by postfix.imss70 (Postfix) with ESMTP id C89D2165576; Tue, 20 Aug 2013 14:03:03 +0000 (GMT) Received: from prod-mail-relay04.akamai.com (prod-mail-relay04.akamai.com [172.27.8.27]) by prod-mail-xrelay06.akamai.com (Postfix) with ESMTP id BD24E165572; Tue, 20 Aug 2013 14:03:03 +0000 (GMT) Received: from usma1ex-cashub.kendall.corp.akamai.com (usma1ex-cashub4.kendall.corp.akamai.com [172.27.105.20]) by prod-mail-relay04.akamai.com (Postfix) with ESMTP id 9405047C0A; Tue, 20 Aug 2013 14:03:03 +0000 (GMT) Received: from USMBX1.msg.corp.akamai.com ([169.254.1.119]) by USMA1EX-CASHUB4.kendall.corp.akamai.com ([172.27.105.20]) with mapi; Tue, 20 Aug 2013 10:03:00 -0400 From: "Salz, Rich" To: Yoav Nir , Andrei Popov Date: Tue, 20 Aug 2013 10:03:00 -0400 Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABuHQCAALk1oA== Message-ID: <2A0EFB9C05D0164E98F19BB0AF3708C711CDF869DC@USMBX1.msg.corp.akamai.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <7F46F059-63FA-4ABB-9176-68345DA5398B@checkpoint.com> In-Reply-To: <7F46F059-63FA-4ABB-9176-68345DA5398B@checkpoint.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 14:03:11 -0000 > I have no problem with having HTTP/2.0 there now, as long as we're all cl= ear that this does not relate to draft-ietf-httpbis-http2-xx, but only to t= he protocol in the eventual RFC. I think that's asking for trouble. Some implementations will start using i= t because "draft-ietf-xxxx is in last call" and then some fundamental major= issue will be found and they don't interop. If HTTP WG doesn't want it, t= hen leave it out. Perhaps when they publish their RFC they could include t= he appropriate app registration. > 3. The experimental namespace was requested by several TLS WG participant= s; it would be great if they could share their opinions of RFC 6648 section= 3 "Recommendations for Creators of New Parameters". If the protocol were a DNS CName entry, then the registration is 'free' We= could drop the requirement that the actual entry exist, just make it DNS s= yntax. And use example.com as the private/experimental space. /r$ -- =20 Principal Security Engineer Akamai Technology Cambridge, MA From ynir@checkpoint.com Tue Aug 20 08:03:15 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B329811E822E for ; Tue, 20 Aug 2013 08:03:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.682 X-Spam-Level: X-Spam-Status: No, score=-10.682 tagged_above=-999 required=5 tests=[AWL=-0.083, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jYBjaha9wDbu for ; Tue, 20 Aug 2013 08:03:10 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 1BCE011E8247 for ; Tue, 20 Aug 2013 08:03:08 -0700 (PDT) Received: from DAG-EX10.ad.checkpoint.com ([194.29.34.150]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7KF33El022175; Tue, 20 Aug 2013 18:03:03 +0300 X-CheckPoint: {52138527-F-1B221DC2-1FFFF} Received: from IL-EX10.ad.checkpoint.com ([169.254.2.105]) by DAG-EX10.ad.checkpoint.com ([169.254.3.223]) with mapi id 14.02.0342.003; Tue, 20 Aug 2013 18:03:02 +0300 From: Yoav Nir To: "Salz, Rich" Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABuHQCAALk1oP//4LWA Date: Tue, 20 Aug 2013 15:03:02 +0000 Message-ID: <481A01D8-58EC-4D96-B195-0E5413BE10A4@checkpoint.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <7F46F059-63FA-4ABB-9176-68345DA5398B@checkpoint.com> <2A0EFB9C05D0164E98F19BB0AF3708C711CDF869DC@USMBX1.msg.corp.akamai.com> In-Reply-To: <2A0EFB9C05D0164E98F19BB0AF3708C711CDF869DC@USMBX1.msg.corp.akamai.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.31.20.252] x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: Clean x-cpdlp: 113e4aab2a96b5cd77e94fa1e8ed2103d559ec1191 Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 15:03:15 -0000 On Aug 20, 2013, at 5:03 PM, "Salz, Rich" wrote: >> I have no problem with having HTTP/2.0 there now, as long as we're all c= lear that this does not relate to draft-ietf-httpbis-http2-xx, but only to = the protocol in the eventual RFC. >=20 > I think that's asking for trouble. Some implementations will start using= it because "draft-ietf-xxxx is in last call" and then some fundamental maj= or issue will be found and they don't interop. If HTTP WG doesn't want it,= then leave it out. Perhaps when they publish their RFC they could include= the appropriate app registration. Makes no difference if it's in the registry, or if the IANA Considerations = section says "IANA is requested to allocate the string "HTTP/2.0" for the s= pecification in this document" >> 3. The experimental namespace was requested by several TLS WG participan= ts; it would be great if they could share their opinions of RFC 6648 sectio= n 3 "Recommendations for Creators of New Parameters". >=20 > If the protocol were a DNS CName entry, then the registration is 'free' = We could drop the requirement that the actual entry exist, just make it DNS= syntax. And use example.com as the private/experimental space. >=20 > /r$ >=20 > -- =20 > Principal Security Engineer > Akamai Technology > Cambridge, MA From rsalz@akamai.com Tue Aug 20 08:09:13 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2582911E828D for ; Tue, 20 Aug 2013 08:09:10 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6Zf6UqgRkJNw for ; Tue, 20 Aug 2013 08:09:05 -0700 (PDT) Received: from prod-mail-xrelay06.akamai.com (prod-mail-xrelay06.akamai.com [96.6.114.98]) by ietfa.amsl.com (Postfix) with ESMTP id E7CE111E8276 for ; Tue, 20 Aug 2013 08:08:56 -0700 (PDT) Received: from prod-mail-xrelay06.akamai.com (localhost.localdomain [127.0.0.1]) by postfix.imss70 (Postfix) with ESMTP id 6F189165582; Tue, 20 Aug 2013 15:08:54 +0000 (GMT) Received: from prod-mail-relay03.akamai.com (prod-mail-relay03.akamai.com [172.27.8.26]) by prod-mail-xrelay06.akamai.com (Postfix) with ESMTP id 645CB16557A; Tue, 20 Aug 2013 15:08:54 +0000 (GMT) Received: from usma1ex-cashub.kendall.corp.akamai.com (usma1ex-cashub6.kendall.corp.akamai.com [172.27.105.22]) by prod-mail-relay03.akamai.com (Postfix) with ESMTP id 4D07B2FD87; Tue, 20 Aug 2013 15:08:54 +0000 (GMT) Received: from USMBX1.msg.corp.akamai.com ([169.254.1.119]) by USMA1EX-CASHUB6.kendall.corp.akamai.com ([172.27.105.22]) with mapi; Tue, 20 Aug 2013 11:08:51 -0400 From: "Salz, Rich" To: Yoav Nir Date: Tue, 20 Aug 2013 11:08:50 -0400 Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABuHQCAALk1oP//4LWAgAAzexA= Message-ID: <2A0EFB9C05D0164E98F19BB0AF3708C711CDF86A56@USMBX1.msg.corp.akamai.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <7F46F059-63FA-4ABB-9176-68345DA5398B@checkpoint.com> <2A0EFB9C05D0164E98F19BB0AF3708C711CDF869DC@USMBX1.msg.corp.akamai.com> <481A01D8-58EC-4D96-B195-0E5413BE10A4@checkpoint.com> In-Reply-To: <481A01D8-58EC-4D96-B195-0E5413BE10A4@checkpoint.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 15:09:13 -0000 > Makes no difference if it's in the registry, or if the IANA Consideration= s section says "IANA is requested to allocate the string "HTTP/2.0" for the= specification in this document" Well since it makes no difference to you, and since it does seem to make a = difference to the HTTP-WG, and since we can avoid a potential problem by do= ing it this way, then we should just leave it to the HTTP-WG to do the requ= est. /r$ -- =20 Principal Security Engineer Akamai Technology Cambridge, MA From ynir@checkpoint.com Tue Aug 20 08:35:54 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E61F821F9C47 for ; Tue, 20 Aug 2013 08:35:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.599 X-Spam-Level: X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ILsgPKTHtbXZ for ; Tue, 20 Aug 2013 08:35:44 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 1769021F9C17 for ; Tue, 20 Aug 2013 08:35:41 -0700 (PDT) Received: from DAG-EX10.ad.checkpoint.com ([194.29.34.150]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7KFZZjJ013912; Tue, 20 Aug 2013 18:35:35 +0300 X-CheckPoint: {52138CC7-1E-1B221DC2-1FFFF} Received: from IL-EX10.ad.checkpoint.com ([169.254.2.105]) by DAG-EX10.ad.checkpoint.com ([169.254.3.223]) with mapi id 14.02.0342.003; Tue, 20 Aug 2013 18:35:35 +0300 From: Yoav Nir To: "Salz, Rich" Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABuHQCAALk1oP//4LWAgAAzexD//9WfgA== Date: Tue, 20 Aug 2013 15:35:35 +0000 Message-ID: References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <7F46F059-63FA-4ABB-9176-68345DA5398B@checkpoint.com> <2A0EFB9C05D0164E98F19BB0AF3708C711CDF869DC@USMBX1.msg.corp.akamai.com> <481A01D8-58EC-4D96-B195-0E5413BE10A4@checkpoint.com> <2A0EFB9C05D0164E98F19BB0AF3708C711CDF86A56@USMBX1.msg.corp.akamai.com> In-Reply-To: <2A0EFB9C05D0164E98F19BB0AF3708C711CDF86A56@USMBX1.msg.corp.akamai.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [91.90.139.159] x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: Clean x-cpdlp: 112249b47b22e48052a647d90cf8b3ae198f74389f Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 15:35:55 -0000 On Aug 20, 2013, at 6:08 PM, "Salz, Rich" wrote: >> Makes no difference if it's in the registry, or if the IANA Consideratio= ns section says "IANA is requested to allocate the string "HTTP/2.0" for th= e specification in this document" >=20 > Well since it makes no difference to you, and since it does seem to make = a difference to the HTTP-WG, and since we can avoid a potential problem by = doing it this way, then we should just leave it to the HTTP-WG to do the re= quest. Sure. But that will not stop implementers from using the label based on the= IANA Considerations section in the draft (when it's in last call and all)= From paul.hoffman@vpnc.org Tue Aug 20 09:17:44 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0ECB311E8232 for ; Tue, 20 Aug 2013 09:17:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.562 X-Spam-Level: X-Spam-Status: No, score=-102.562 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yUgqUyUMKA6v for ; Tue, 20 Aug 2013 09:17:43 -0700 (PDT) Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 8A78C11E8202 for ; Tue, 20 Aug 2013 09:17:43 -0700 (PDT) Received: from [165.227.249.247] (sn80.proper.com [75.101.18.80]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.5) with ESMTP id r7KGHcnX087225 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Tue, 20 Aug 2013 09:17:40 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) X-Authentication-Warning: hoffman.proper.com: Host sn80.proper.com [75.101.18.80] claimed to be [165.227.249.247] Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Paul Hoffman In-Reply-To: Date: Tue, 20 Aug 2013 09:17:37 -0700 Content-Transfer-Encoding: quoted-printable Message-Id: <6E86C568-138A-4DCC-A879-EF8CC7C28CD9@vpnc.org> References: To: "tls@ietf.org" X-Mailer: Apple Mail (2.1508) Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 16:17:44 -0000 On Aug 19, 2013, at 11:04 AM, Martin Thomson = wrote: > Can I request that when you create the registry in ALPN that you do > not register HTTP/2.0? More likely than not, ALPN will precede > HTTP/2.0 and I want to avoid having a dependency issue, particularly > if we find that we need to change the string for some reason. The IETF has a checkered past when it comes to pre-assigning names to = moving targets. Unless the TLS WG hears from the HTTPbis WG exactly what = they want us to do (and that seems unlikely), I propose that this draft = does not have any entry for any future protocol. If the HTTPbis WG wants = to add to the registry before they have a finished document, they can do = that themselves. --Paul Hoffman= From martin.thomson@gmail.com Tue Aug 20 09:48:35 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D27311E80FA for ; Tue, 20 Aug 2013 09:48:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.608 X-Spam-Level: X-Spam-Status: No, score=-2.608 tagged_above=-999 required=5 tests=[AWL=-0.008, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XqlXTxK9fays for ; Tue, 20 Aug 2013 09:48:35 -0700 (PDT) Received: from mail-we0-x236.google.com (mail-we0-x236.google.com [IPv6:2a00:1450:400c:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id A004F21F9BDB for ; Tue, 20 Aug 2013 09:48:34 -0700 (PDT) Received: by mail-we0-f182.google.com with SMTP id q59so633700wes.41 for ; Tue, 20 Aug 2013 09:48:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=N5CdYe5RdgYYqhb5vGN6RxFjdxCeLRNsYlLQ68R93SA=; b=LFuIsJhnNlWrll+9pRApYQN4/uQuiHEwOr1F1vCTi30y81//WhrKLLzkqXnKIRvOZ2 uFY7EAVK6xlXd4rDJv/iYkGHSBUzbXxFlGiM5aQx+SmL6YEcCMjDOOJl+n29cKTJhDdH h6Qwafe+V67krYl8+zaE7RxCCLhkZxnFlCum4Loi2WDz5WapKcJDjU44IsM6cgSIncyS VHyoyhVv2Akhxd16030LBUpoxX9AYMkDQdMfYLjj9+t0LdYPYuuKCZ2XEiREidedpqyI EtABIlTBLpD+WKUzWUW6ql18UCg1T90ukkNPDdi22eCGc7e5iYPWSNuJdbIIBue4PiJL pKiw== MIME-Version: 1.0 X-Received: by 10.180.90.106 with SMTP id bv10mr1946249wib.65.1377017313814; Tue, 20 Aug 2013 09:48:33 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Tue, 20 Aug 2013 09:48:33 -0700 (PDT) In-Reply-To: <6E86C568-138A-4DCC-A879-EF8CC7C28CD9@vpnc.org> References: <6E86C568-138A-4DCC-A879-EF8CC7C28CD9@vpnc.org> Date: Tue, 20 Aug 2013 09:48:33 -0700 Message-ID: From: Martin Thomson To: Paul Hoffman Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 16:48:35 -0000 On 20 August 2013 09:17, Paul Hoffman wrote: > > The IETF has a checkered past when it comes to pre-assigning names to mov= ing targets. Unless the TLS WG hears from the HTTPbis WG exactly what they = want us to do (and that seems unlikely), I propose that this draft does not= have any entry for any future protocol. If the HTTPbis WG wants to add to = the registry before they have a finished document, they can do that themsel= ves. +1. That's exactly the request that I made. I think that I'm perfectly capable of adding the necessary IANA considerations section. From martin.thomson@gmail.com Tue Aug 20 09:54:09 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 660E311E8258 for ; Tue, 20 Aug 2013 09:54:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.608 X-Spam-Level: X-Spam-Status: No, score=-2.608 tagged_above=-999 required=5 tests=[AWL=-0.008, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2yu7figtIKCH for ; Tue, 20 Aug 2013 09:54:05 -0700 (PDT) Received: from mail-wi0-x232.google.com (mail-wi0-x232.google.com [IPv6:2a00:1450:400c:c05::232]) by ietfa.amsl.com (Postfix) with ESMTP id 6BB7B11E8259 for ; Tue, 20 Aug 2013 09:53:54 -0700 (PDT) Received: by mail-wi0-f178.google.com with SMTP id j17so200272wiw.17 for ; Tue, 20 Aug 2013 09:53:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=wD/geIVNjYuyTCCue49KsO56H0M65h2zczrtYoVKvDA=; b=aHQj7UnCObmnBzZWGnItdNU6mPVTSa1LoeYkoHdYgJXqyi6hSb/YYSE8Rual2t7LkA etYPShUrFvSCKfGe29zJ86icFjJfm6879Fgt3r+X6ZfGEsA4BY8wGbmeioowTPAh8L6T 3lE2NCxj6DwRDWorNHOxF+wTjoCJKfxLuGoRqLA3666EWWSpt/pcmz1hc73IAAIsgsrm a92HE657a9vFi81Vja/8ucZD0foTGCPBxKYpOTC81BtEVtJ9IQr6qXhMnWxM77A3cXsj 0D66baa9R/5nlGsrhQk27RavyTLpuKSy4b1Ji6KvNCAyZq19XERdIc4TA1H/lsnsnT34 s1TQ== MIME-Version: 1.0 X-Received: by 10.194.93.135 with SMTP id cu7mr145270wjb.73.1377017633522; Tue, 20 Aug 2013 09:53:53 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Tue, 20 Aug 2013 09:53:53 -0700 (PDT) In-Reply-To: <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> Date: Tue, 20 Aug 2013 09:53:53 -0700 Message-ID: From: Martin Thomson To: Yoav Nir Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 16:54:09 -0000 On 19 August 2013 22:54, Yoav Nir wrote: > It's not meant to be displayed to the end user, as in my mother surfing t= he web. But it's nice to be able to see a recognizable string in Wireshark.= So yes, keep HTTP/1.1 (and HTTP/2.0). SPDY, however, should be experimenta= l or some such. There's no reason to keep it in the registry forever, or pl= ace it in the registry in the first place. I have no trouble keeping "HTTP/1.1". I do have a concern that the string "http/1.1" will cause confusion though. Is it really so difficult to register an uppercase string? > I agree with the RFC. I prefer a private space that has an "owner". Rather than inventing a new semantic-free, structured identifier space, which the RFC in question specifically recommends against, why don't we just do what RFC 6648 recommends and create a registry. Registration is cheap. And if you feel the urge to experiment without registering your codepoint, that's cool too. From ynir@checkpoint.com Tue Aug 20 11:16:50 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F35C21F92B8 for ; Tue, 20 Aug 2013 11:16:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -11.678 X-Spam-Level: X-Spam-Status: No, score=-11.678 tagged_above=-999 required=5 tests=[AWL=0.921, BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oEcu7l2nIRP1 for ; Tue, 20 Aug 2013 11:16:44 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 8B7D621F995F for ; Tue, 20 Aug 2013 11:16:43 -0700 (PDT) Received: from DAG-EX10.ad.checkpoint.com ([194.29.34.150]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7KIGdl1028145; Tue, 20 Aug 2013 21:16:39 +0300 X-CheckPoint: {5213B287-30-1B221DC2-1FFFF} Received: from IL-EX10.ad.checkpoint.com ([169.254.2.105]) by DAG-EX10.ad.checkpoint.com ([169.254.3.223]) with mapi id 14.02.0342.003; Tue, 20 Aug 2013 21:16:39 +0300 From: Yoav Nir To: Martin Thomson Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABs+YCAALn/gIAAFyoA Date: Tue, 20 Aug 2013 18:16:38 +0000 Message-ID: <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.31.21.193] x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: Clean x-cpdlp: 110084a1e82541f865a51b0b5ef6e236ed2aec085f Content-Type: text/plain; charset="us-ascii" Content-ID: <0F30401A914FB44A82E96A4DD710AB0A@ad.checkpoint.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 18:16:50 -0000 On Aug 20, 2013, at 7:53 PM, Martin Thomson wrot= e: > On 19 August 2013 22:54, Yoav Nir wrote: >> It's not meant to be displayed to the end user, as in my mother surfing = the web. But it's nice to be able to see a recognizable string in Wireshark= . So yes, keep HTTP/1.1 (and HTTP/2.0). SPDY, however, should be experiment= al or some such. There's no reason to keep it in the registry forever, or p= lace it in the registry in the first place. >=20 > I have no trouble keeping "HTTP/1.1". I do have a concern that the > string "http/1.1" will cause confusion though. Is it really so > difficult to register an uppercase string? Well, uppercase letters tend to be bigger, which may be an issue for constr= ained devices. +1 on harmonizing with the string we all know and love. >> I agree with the RFC. I prefer a private space that has an "owner". >=20 > Rather than inventing a new semantic-free, structured identifier > space, which the RFC in question specifically recommends against, why > don't we just do what RFC 6648 recommends and create a registry. > Registration is cheap. And if you feel the urge to experiment without > registering your codepoint, that's cool too. This tends to make registries fill up with failed and obsoleted experiments= . For example, if all goes well, there will be no need to ever again use "s= pdy/1", "spdy/2", and "spdy/3" in a year or so from now. "spdy/1" and "spdy= /2" can probably already be pulled out of the proposed initial assignment. = But there is never a procedure to remove stuff from registries. Anyway, registration is cheap or not based on policy. I've just noticed tha= t this draft does not specify an IANA policy (RFC 5226). So I propose that = the following sentence be added to section 6: "The assignment policy for th= is new registry shall be 'First Come, First Served'."=20 Yoav From Andrei.Popov@microsoft.com Tue Aug 20 12:31:33 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02DD911E8260 for ; Tue, 20 Aug 2013 12:31:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.599 X-Spam-Level: X-Spam-Status: No, score=-5.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uv7lpfJS9yEk for ; Tue, 20 Aug 2013 12:31:27 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0210.outbound.protection.outlook.com [207.46.163.210]) by ietfa.amsl.com (Postfix) with ESMTP id B995311E8153 for ; Tue, 20 Aug 2013 12:31:27 -0700 (PDT) Received: from BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) by BL2PR03MB196.namprd03.prod.outlook.com (10.255.230.155) with Microsoft SMTP Server (TLS) id 15.0.745.25; Tue, 20 Aug 2013 19:16:22 +0000 Received: from BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.159]) by BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.218]) with mapi id 15.00.0745.000; Tue, 20 Aug 2013 19:16:22 +0000 From: Andrei Popov To: Yoav Nir , Martin Thomson Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaaN1TNnQyJLEe2jldO/oM6xJmdHa2AgAB7v4CAALg6gIAAFx8AgAAF99A= Date: Tue, 20 Aug 2013 19:16:21 +0000 Message-ID: <073b3285216c4e7b8879cd9cefc4c423@BL2PR03MB194.namprd03.prod.outlook.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> In-Reply-To: <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [2001:4898:80e8:ed31::2] x-forefront-prvs: 09443CAA7E x-forefront-antispam-report: SFV:NSPM; SFS:(52314003)(13464003)(377454003)(189002)(199002)(24454002)(51704005)(74876001)(69226001)(56776001)(53806001)(4396001)(81542001)(74316001)(31966008)(74662001)(80976001)(81342001)(47446002)(76482001)(81816001)(74706001)(54316002)(74502001)(50986001)(77096001)(56816003)(63696002)(54356001)(59766001)(74366001)(77982001)(51856001)(83322001)(76576001)(46102001)(65816001)(79102001)(49866001)(33646001)(47736001)(80022001)(19580395003)(19580405001)(76796001)(81686001)(47976001)(76786001)(83072001)(3826001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BL2PR03MB196; H:BL2PR03MB194.namprd03.prod.outlook.com; CLIP:2001:4898:80e8:ed31::2; RD:InfoNoRecords; MX:1; A:1; LANG:en; Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: DuplicateDomain-a84fc36a-4ed7-4e57-ab1c-3e967bcbad48.microsoft.com X-MS-Exchange-CrossPremises-AuthAs: Internal X-MS-Exchange-CrossPremises-AuthMechanism: 03 X-MS-Exchange-CrossPremises-AuthSource: BL2PR03MB194.namprd03.prod.outlook.com X-MS-Exchange-CrossPremises-SCL: 1 X-MS-Exchange-CrossPremises-messagesource: StoreDriver X-MS-Exchange-CrossPremises-BCC: X-MS-Exchange-CrossPremises-originalclientipaddress: 2001:4898:80e8:ed31::2 X-MS-Exchange-CrossPremises-avstamp-service: 1.0 X-MS-Exchange-CrossPremises-antispam-scancontext: DIR:Originating; SFV:NSPM; SKIP:0; X-MS-Exchange-CrossPremises-processed-by-journaling: Journal Agent X-MS-Exchange-CrossPremises-ContentConversionOptions: False; 00160000; True; ; iso-8859-1 X-OrganizationHeadersPreserved: BL2PR03MB196.namprd03.prod.outlook.com Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 19:31:33 -0000 The convenience of harmonizing the HTTP/1.1 protocol ID is clear to me. Unf= ortunately, the current lower-case ID is already used, e.g. by MS clients a= nd Google servers. We could add an alternative, upper-case version of the I= D in the draft, but in practice the lower-case version will remain deployed= /supported for years to come. I doubt that the benefits of "harmonization" = would outweigh the resulting confusion and the extra bytes in the ClientHel= lo, so perhaps it's better to keep the existing lower-case HTTP/1.1 protoco= l ID. -----Original Message----- From: Yoav Nir [mailto:ynir@checkpoint.com]=20 Sent: Tuesday, August 20, 2013 11:17 AM To: Martin Thomson Cc: Andrei Popov; tls@ietf.org Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 On Aug 20, 2013, at 7:53 PM, Martin Thomson wrot= e: > On 19 August 2013 22:54, Yoav Nir wrote: >> It's not meant to be displayed to the end user, as in my mother surfing = the web. But it's nice to be able to see a recognizable string in Wireshark= . So yes, keep HTTP/1.1 (and HTTP/2.0). SPDY, however, should be experiment= al or some such. There's no reason to keep it in the registry forever, or p= lace it in the registry in the first place. >=20 > I have no trouble keeping "HTTP/1.1". I do have a concern that the=20 > string "http/1.1" will cause confusion though. Is it really so=20 > difficult to register an uppercase string? Well, uppercase letters tend to be bigger, which may be an issue for constr= ained devices. +1 on harmonizing with the string we all know and love. >> I agree with the RFC. I prefer a private space that has an "owner". >=20 > Rather than inventing a new semantic-free, structured identifier=20 > space, which the RFC in question specifically recommends against, why=20 > don't we just do what RFC 6648 recommends and create a registry. > Registration is cheap. And if you feel the urge to experiment without=20 > registering your codepoint, that's cool too. This tends to make registries fill up with failed and obsoleted experiments= . For example, if all goes well, there will be no need to ever again use "s= pdy/1", "spdy/2", and "spdy/3" in a year or so from now. "spdy/1" and "spdy= /2" can probably already be pulled out of the proposed initial assignment. = But there is never a procedure to remove stuff from registries. Anyway, registration is cheap or not based on policy. I've just noticed tha= t this draft does not specify an IANA policy (RFC 5226). So I propose that = the following sentence be added to section 6: "The assignment policy for th= is new registry shall be 'First Come, First Served'."=20 Yoav From martin.thomson@gmail.com Tue Aug 20 13:14:26 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12AFF11E8153 for ; Tue, 20 Aug 2013 13:14:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.607 X-Spam-Level: X-Spam-Status: No, score=-2.607 tagged_above=-999 required=5 tests=[AWL=-0.007, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OxE6lgN2SW+U for ; Tue, 20 Aug 2013 13:14:25 -0700 (PDT) Received: from mail-we0-x22a.google.com (mail-we0-x22a.google.com [IPv6:2a00:1450:400c:c03::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 6E88B11E8142 for ; Tue, 20 Aug 2013 13:14:25 -0700 (PDT) Received: by mail-we0-f170.google.com with SMTP id w62so867300wes.1 for ; Tue, 20 Aug 2013 13:14:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=FmHZVlMSjuziBlVnuc6RXQ5XM47ZWpdTnwnCjEvDmZM=; b=J0VD9qXQJgpsHo/lf+fiIgEEKwG/ofA4VdTVJmDqn0zbIVs19uN3E5hTtXDuvA3d9i SywiMAeBTfNxhI2elLTFvxEwVQ1JN4RHzqmd36WWEd5C8VX3fgUVwC/zCM7FPUuXKPvm aGAraqVFoRuFZ4P5ETJB8NSMM2xtMmc8BIUmO6gaNfUDOt56b7HmA7S3qftU/taDjXpz k84Cl3wy+CcJZiLJcgn5IhOjUr+4B79SQwOAQhFHwThOi7yOQlzcFXUoYhZne7D7aH+3 NzGX3J04vo4NViKjlCngTr/1+G2tk7MmHkbM/KtpLyH519YgHDbOvnHE3nM+H9fSwsUY KZhQ== MIME-Version: 1.0 X-Received: by 10.194.220.103 with SMTP id pv7mr2869104wjc.14.1377029663200; Tue, 20 Aug 2013 13:14:23 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Tue, 20 Aug 2013 13:14:23 -0700 (PDT) In-Reply-To: <073b3285216c4e7b8879cd9cefc4c423@BL2PR03MB194.namprd03.prod.outlook.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> <073b3285216c4e7b8879cd9cefc4c423@BL2PR03MB194.namprd03.prod.outlook.com> Date: Tue, 20 Aug 2013 13:14:23 -0700 Message-ID: From: Martin Thomson To: Andrei Popov Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 20:14:26 -0000 On 20 August 2013 12:16, Andrei Popov wrote: > The convenience of harmonizing the HTTP/1.1 protocol ID is clear to me. U= nfortunately, the current lower-case ID is already used, e.g. by MS clients= and Google servers. We could add an alternative, upper-case version of the= ID in the draft, but in practice the lower-case version will remain deploy= ed/supported for years to come. I doubt that the benefits of "harmonization= " would outweigh the resulting confusion and the extra bytes in the ClientH= ello, so perhaps it's better to keep the existing lower-case HTTP/1.1 proto= col ID. Sounds like a good enough reason to keep the http/1.1 registration lowercase. Doubling up is almost guaranteed to cause more confusion than a mere case shift. From ynir@checkpoint.com Tue Aug 20 14:36:27 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B7AA11E82D8 for ; Tue, 20 Aug 2013 14:36:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.724 X-Spam-Level: X-Spam-Status: No, score=-10.724 tagged_above=-999 required=5 tests=[AWL=-0.125, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BOXFWfrGg-yg for ; Tue, 20 Aug 2013 14:36:21 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 19F1611E82E6 for ; Tue, 20 Aug 2013 14:36:20 -0700 (PDT) Received: from DAG-EX10.ad.checkpoint.com ([194.29.34.150]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7KLaAX5004440; Wed, 21 Aug 2013 00:36:10 +0300 X-CheckPoint: {5213E14A-38-1B221DC2-1FFFF} Received: from IL-EX10.ad.checkpoint.com ([169.254.2.105]) by DAG-EX10.ad.checkpoint.com ([169.254.3.223]) with mapi id 14.02.0342.003; Wed, 21 Aug 2013 00:36:10 +0300 From: Yoav Nir To: Martin Thomson Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaCdJJT7vp320qHp0flMWqEHJmc+GSAgABs+YCAALn/gIAAFyoAgAAQpICAABA3gIAAFuUA Date: Tue, 20 Aug 2013 21:36:09 +0000 Message-ID: <383DCBA8-194B-461B-BB8D-45CC501DEDD8@checkpoint.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> <073b3285216c4e7b8879cd9cefc4c423@BL2PR03MB194.namprd03.prod.outlook.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.31.21.0] x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: Clean x-cpdlp: 1169b72e900bf0b470757412593cf29d7729847d43 Content-Type: text/plain; charset="us-ascii" Content-ID: <02F3CF22254EEA4691093400602C3628@ad.checkpoint.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Aug 2013 21:36:27 -0000 On Aug 20, 2013, at 11:14 PM, Martin Thomson wro= te: > On 20 August 2013 12:16, Andrei Popov wrote: >> The convenience of harmonizing the HTTP/1.1 protocol ID is clear to me. = Unfortunately, the current lower-case ID is already used, e.g. by MS client= s and Google servers. We could add an alternative, upper-case version of th= e ID in the draft, but in practice the lower-case version will remain deplo= yed/supported for years to come. I doubt that the benefits of "harmonizatio= n" would outweigh the resulting confusion and the extra bytes in the Client= Hello, so perhaps it's better to keep the existing lower-case HTTP/1.1 prot= ocol ID. >=20 > Sounds like a good enough reason to keep the http/1.1 registration > lowercase. Doubling up is almost guaranteed to cause more confusion > than a mere case shift. +1 From hauke@hauke-m.de Wed Aug 21 03:54:25 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E446211E81FA for ; Wed, 21 Aug 2013 03:54:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BFiUHdJ+FwGC for ; Wed, 21 Aug 2013 03:54:25 -0700 (PDT) Received: from hauke-m.de (Hauke-2-pt.tunnel.tserv6.fra1.ipv6.he.net [IPv6:2001:470:1f0a:465::2]) by ietfa.amsl.com (Postfix) with ESMTP id 5FEB511E8128 for ; Wed, 21 Aug 2013 03:54:24 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by hauke-m.de (Postfix) with ESMTP id A8EEF85EA for ; Wed, 21 Aug 2013 12:54:23 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at hauke-m.de Received: from hauke-m.de ([127.0.0.1]) by localhost (hauke-m.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FbuYIvvvZA9U for ; Wed, 21 Aug 2013 12:54:12 +0200 (CEST) Received: from [IPv6:2001:638:708:30da:b160:a69a:6717:38c5] (unknown [IPv6:2001:638:708:30da:b160:a69a:6717:38c5]) by hauke-m.de (Postfix) with ESMTPSA id 5827C857F for ; Wed, 21 Aug 2013 12:54:12 +0200 (CEST) Message-ID: <52149C52.9090506@hauke-m.de> Date: Wed, 21 Aug 2013 12:54:10 +0200 From: Hauke Mehrtens User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130803 Thunderbird/17.0.8 MIME-Version: 1.0 To: tls@ietf.org X-Enigmail-Version: 1.4.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: [TLS] DTLS lost connection on server side X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 10:54:26 -0000 This problem is similar to the problem described in RFC6347 section 4.2.8. Establishing New Associations with Existing Parameters. We have a DTLS Server S and a DTLS Client C which did a successful handshake and have an encrypted connection. 1. S looses its state (e.g., after a reboot) and C does not get informed about that. 2. C send an encrypted application data package to S, because C does not know that S lost its state and it has some new data. 3. S send a unencrypted fatal unexpected_message alert, because it does not have any connection with C and is unable to decrypt the message or encrypt the alert. What should C now do with this alert? A: Ignore it, because it thinks it has an encrypted channel with the other peer. Then it will never be able to send a package to the other peer. B: Handle it and try to do a new DTLS handshake with the peer. Now any attacker would be able to reset the connection with just sending an unencrypted alert. C: Ignore it and wait till some timeout and do a new handshake. It takes some time till the new connection will be established. Hauke From Michael.Tuexen@lurchi.franken.de Wed Aug 21 04:23:16 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9078411E81FD for ; Wed, 21 Aug 2013 04:23:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 52y8zRP+-5ia for ; Wed, 21 Aug 2013 04:23:16 -0700 (PDT) Received: from mail-n.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) by ietfa.amsl.com (Postfix) with ESMTP id C8BF611E81E8 for ; Wed, 21 Aug 2013 04:23:15 -0700 (PDT) Received: from [192.168.1.200] (p508F1AF6.dip0.t-ipconnect.de [80.143.26.246]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTP id 965B51C0C069E; Wed, 21 Aug 2013 13:23:13 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Michael Tuexen In-Reply-To: <52149C52.9090506@hauke-m.de> Date: Wed, 21 Aug 2013 13:23:12 +0200 Content-Transfer-Encoding: 7bit Message-Id: <6CD75BF8-92D3-4F43-9DD8-F243EADF84E6@lurchi.franken.de> References: <52149C52.9090506@hauke-m.de> To: Hauke Mehrtens X-Mailer: Apple Mail (2.1508) Cc: tls@ietf.org Subject: Re: [TLS] DTLS lost connection on server side X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 11:23:16 -0000 On Aug 21, 2013, at 12:54 PM, Hauke Mehrtens wrote: > This problem is similar to the problem described in RFC6347 section > 4.2.8. Establishing New Associations with Existing Parameters. > > We have a DTLS Server S and a DTLS Client C which did a successful > handshake and have an encrypted connection. > > > 1. S looses its state (e.g., after a reboot) and C does not get informed > about that. > 2. C send an encrypted application data package to S, because C does not > know that S lost its state and it has some new data. > 3. S send a unencrypted fatal unexpected_message alert, because it does > not have any connection with C and is unable to decrypt the message or > encrypt the alert. > > What should C now do with this alert? > > A: Ignore it, because it thinks it has an encrypted channel with the > other peer. > Then it will never be able to send a package to the other peer. > > B: Handle it and try to do a new DTLS handshake with the peer. > Now any attacker would be able to reset the connection with just > sending an unencrypted alert. > > C: Ignore it and wait till some timeout and do a new handshake. > It takes some time till the new connection will be established. I would suggest to use http://tools.ietf.org/html/rfc6520 and allow C to detect that the peer is gone. Then reconnect. Dead peer detection is one of the use cases for DTLS heartbeats. Best regards Michael > > Hauke > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > From wtc@google.com Wed Aug 21 10:49:57 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2506D11E812D for ; Wed, 21 Aug 2013 10:49:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.978 X-Spam-Level: X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r5jHDiih5cvh for ; Wed, 21 Aug 2013 10:49:56 -0700 (PDT) Received: from mail-qe0-x232.google.com (mail-qe0-x232.google.com [IPv6:2607:f8b0:400d:c02::232]) by ietfa.amsl.com (Postfix) with ESMTP id 8849311E810A for ; Wed, 21 Aug 2013 10:49:56 -0700 (PDT) Received: by mail-qe0-f50.google.com with SMTP id s14so447138qeb.23 for ; Wed, 21 Aug 2013 10:49:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=EVCSICl9PakPdNRx57UhhzGKonSIgDLZsOKdDFNEcUI=; b=AgMi72J+Exh5z91jYtHh8cmr/Ke1Pj6EjL2Qc30AIX2/6zSTDtjal2FwNhuchFDVGV o1Cusa12crgYzro6TXYvyhyLA7JsazvzjvWtY6Jd7tpsWTxXloL+voPM4G1P70sta1BF pCGZIFxRi6AWZTRN0XYft+pEcYrv+fAPUX4Ld8u0V2Jt1xgQZKUDiR0In76k1pB5SZCo NqOPzigkoL7zK1kH+unwXT+EOvpTchGW/XO5qrpPWyjKkpuItOqiVmFX13fNsjJLbXiK 3RivJNX2KJ1iecwx8mAojCN4KdK1ANF4ih/m0+//ebptuDituug54C/zdnYVxR6abKx3 Vx4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:date:message-id:subject:from:to:cc :content-type; bh=EVCSICl9PakPdNRx57UhhzGKonSIgDLZsOKdDFNEcUI=; b=VOUn+AqZstW7sF9jkt1uJk/RX4reAHu765oMPAfP0GXagnWq5Q3vVnF0cj/xvLHFCx mPfBJX+0kgN59Qb3m6k1pgxYHVE4dWopxQsnwi2pI7TKm8UyySVK6uiWrbKLDrbqtFsU NXsxhxgMjB827kX7ffWG1g6/Dm0A0kyOC2YkOSI2O6gWM2yeXqcXKZ3TdLBB9c8dF/Q0 vEf25TOWry8dbmZV0sy4D0R4AZ4G2ntVKqnp0dR/YjWP8RS95nkbw7EUyvnBZrbImuIY XzaGs8ncADLIdD8HzvqzPEZWOphWyvegpP3P1E8Yc8PBBYtASBHwaMokS7Ee8KiRh7T4 19bA== X-Gm-Message-State: ALoCoQkINxTks9+bD+sV7sYmrEKYJpEqFLFiVUzFd7j2Ic01yODTnjOV3gDnysXxPxn8IKE8KyD5PUl3+24VSoWYt3TdztZdHfILE66ooMbj2tJ20Ahfy4CEl3arA7JgZTtZaojX6p7Gr3GA9z2gG6TqwIWCtvZYE33GGhxXrJqqnJQI2tA4aCaW1xft27Q+Ao6wuEk25Iyr MIME-Version: 1.0 X-Received: by 10.229.171.134 with SMTP id h6mr2474306qcz.15.1377107395856; Wed, 21 Aug 2013 10:49:55 -0700 (PDT) Received: by 10.229.154.20 with HTTP; Wed, 21 Aug 2013 10:49:55 -0700 (PDT) Date: Wed, 21 Aug 2013 10:49:55 -0700 Message-ID: From: Wan-Teh Chang To: "tls@ietf.org" Content-Type: text/plain; charset=ISO-8859-1 Cc: foleyj@cisco.com, Ryan Sleevi Subject: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 17:49:57 -0000 While reviewing the NSS patch for the AES-GCM TLS cipher suites, my colleague Ryan Sleevi noticed that the AEAD algorithms defined in draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers. The problem is how TLS 1.2 specifies the additional authenticated data for AEAD ciphers: RFC 5246 Section 6.2.3.3 says: The plaintext is the TLSCompressed.fragment. The additional authenticated data, which we denote as additional_data, is defined as follows: additional_data = seq_num + TLSCompressed.type + TLSCompressed.version + TLSCompressed.length; where "+" denotes concatenation. So additional_data includes the length of the plaintext (TLSCompressed.length). But a TLS 1.2 record only gives us the length of the AEAD ciphertext. So the recipient needs to calculate the plaintext's length using only the ciphertext. This is difficult to do with the AEAD algorithms in draft-mcgrew-aead-aes-cbc-hmac-sha2 because the amount of padding, and therefore the plaintext length, is only known after CBC decryption. Is this a known problem with TLS 1.2 AEAD ciphers? Wan-Teh Chang From agl@google.com Wed Aug 21 11:02:46 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F1D811E83C2 for ; Wed, 21 Aug 2013 11:02:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.978 X-Spam-Level: X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IGF05Mu6TdTb for ; Wed, 21 Aug 2013 11:02:46 -0700 (PDT) Received: from mail-oa0-x236.google.com (mail-oa0-x236.google.com [IPv6:2607:f8b0:4003:c02::236]) by ietfa.amsl.com (Postfix) with ESMTP id DCC7911E8102 for ; Wed, 21 Aug 2013 11:02:45 -0700 (PDT) Received: by mail-oa0-f54.google.com with SMTP id o6so1551391oag.27 for ; Wed, 21 Aug 2013 11:02:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=bg+YcSMDnES0Hj7xJPeWm5lalUnFSLffxpEzWCRHwcs=; b=poD/LbATBedXLoTq0bqX22dVp+S5rQcVPWSVV89T+a3WX7c3wIuAbHrlBLIWCBRU3A bdqu83eZ+2inA26eNlf581Y/gp7QPFRTwSn69tkFz4NOa9Lyo76On2+EIf/PRNk5VNFR IfU1k7g4EJePKupXQ6t/Js3r2BSIwqbGKHKHw9wT37znCMxIdDg8gRdj4AVV4yMXtTx+ ABoOxLMfxC8lJ+fTlFbz0HzwN5F/2jsFZviYYI+FnqMGgkHVbU1b+Jrc149B9y8iSikq Rix1HA4of3D9WnVf+1K2lVDO1LGBknKIqrFL56dfwZv02w8ywatFQjimaoJCmuiU/QhV fGxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=bg+YcSMDnES0Hj7xJPeWm5lalUnFSLffxpEzWCRHwcs=; b=Y/0wGvlji5O66BU2qncwCMUSRngYXaIIg+hvaRf0fn+c8nN+02IFBm3+RHKuu0yTMh f5OXnDP/zxHrdKcSKRFxKc7Aiexzih5C3kERQdaQ3he6kqDe2N3hRRTeXywOVELQAnFD gLqfV53nQskR1JqVKr1KJ00ZcO/2gALO8O0Enyyj9+quUNENmDMu86H+QsPM2DNo6xM2 hM7/InGM21H1UzyKtBHKCe0Kdr46j/w33rzCU+M06YnglS/Ddm4Sa3xJVl2y9muaop21 9x97Jl+ncw57yD2FHr4Z9FZCWcp6bu2JghDG2B2d/gSP8sFmxNXzGFtgCVlP+sS4FbU5 jUHw== X-Gm-Message-State: ALoCoQlr/+L9RTdB4lm0T1zdBYrKntgusp/L7yL7bJh+oQtUj7hVzHSiLyHUKLItHFvuvAUDi47hNOEZKIu3MzY2KgJEc1Qzh0ejfDwu08PqJuKEBYoRwLDgGUqCIUdbx6WHBK2C9FnKyt3tKKfQsQj3McKGKFdM+fwLFyZFdPob+er9qC8vMCkqPNkh+dlGcVMGbCxozKu8 X-Received: by 10.50.130.65 with SMTP id oc1mr5364230igb.49.1377108162534; Wed, 21 Aug 2013 11:02:42 -0700 (PDT) MIME-Version: 1.0 Received: by 10.231.162.74 with HTTP; Wed, 21 Aug 2013 11:02:22 -0700 (PDT) In-Reply-To: References: From: Adam Langley Date: Wed, 21 Aug 2013 14:02:22 -0400 Message-ID: To: Wan-Teh Chang Content-Type: text/plain; charset=UTF-8 Cc: foleyj@cisco.com, "tls@ietf.org" , Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 18:02:46 -0000 On Wed, Aug 21, 2013 at 1:49 PM, Wan-Teh Chang wrote: > Is this a known problem with TLS 1.2 AEAD ciphers? I hit the same issue while planning to move OpenSSL's TLS CBC decoding into EVP (a lower-layer of OpenSSL). I couldn't figure out a way around it and gave up. Cheers AGL From prvs=194521709e=uri@ll.mit.edu Wed Aug 21 11:57:10 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 894C021F9E48 for ; Wed, 21 Aug 2013 11:57:10 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.6 X-Spam-Level: X-Spam-Status: No, score=-5.6 tagged_above=-999 required=5 tests=[AWL=0.998, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sddWmY7esX8t for ; Wed, 21 Aug 2013 11:57:05 -0700 (PDT) Received: from mx2.ll.mit.edu (MX2.LL.MIT.EDU [129.55.12.46]) by ietfa.amsl.com (Postfix) with ESMTP id 431DE21F9E2B for ; Wed, 21 Aug 2013 11:57:04 -0700 (PDT) Received: from LLE2K7-HUB01.mitll.ad.local (LLE2K7-HUB01.mitll.ad.local) by mx2.ll.mit.edu (unknown) with ESMTP id r7LIv2l5013390; Wed, 21 Aug 2013 14:57:03 -0400 From: "Blumenthal, Uri - 0558 - MITLL" To: Adam Langley Date: Wed, 21 Aug 2013 14:56:56 -0400 Thread-Topic: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers Thread-Index: Ac6eoDgmVOvo1bFiQ52LSyI2udyGSg== Message-ID: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 acceptlanguage: en-US Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha256; boundary="B_3459941816_6204267" MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.10.8794, 1.0.431, 0.0.0000 definitions=2013-08-21_08:2013-08-21, 2013-08-21, 1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1308210139 Cc: "tls@ietf.org" Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 18:57:10 -0000 --B_3459941816_6204267 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit On 8/21/13 14:02 , "Adam Langley" wrote: >On Wed, Aug 21, 2013 at 1:49 PM, Wan-Teh Chang wrote: >> Is this a known problem with TLS 1.2 AEAD ciphers? > >I hit the same issue while planning to move OpenSSL's TLS CBC decoding >into EVP (a lower-layer of OpenSSL). I couldn't figure out a way >around it and gave up. I personally would just use AES-GCM and be content. There's no reason (AFAIK :) to use CBC-HMAC-SHA any more. ;) --B_3459941816_6204267 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIIUFAYJKoZIhvcNAQcCoIIUBTCCFAECAQExDzANBglghkgBZQMEAgEFADALBgkqhkiG9w0B BwGgghHjMIIEyzCCA7OgAwIBAgIKZmfFegAAAABv3jANBgkqhkiG9w0BAQsFADBRMQswCQYD VQQGEwJVUzEfMB0GA1UEChMWTUlUIExpbmNvbG4gTGFib3JhdG9yeTEMMAoGA1UECxMDUEtJ MRMwEQYDVQQDEwpNSVRMTCBDQS0yMB4XDTEzMDYwNTE3NDg1NVoXDTE0MDYwNTE3NDg1NVow YTELMAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRvcnkxDzANBgNV BAsTBlBlb3BsZTEgMB4GA1UEAxMXQmx1bWVudGhhbC5VcmkuNTAwMTA1ODQwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQD0pxreUKJmz3cYObjwcqXaTyUCzAwXTeB7BABDIopD F0wfCHEAhf3lZCftQRtrN6lcvk2d530ESc00q11bwFjiifpTGVTJoxiumHVgFInWHrECeQy0 B9BWM4XiWY3MXvqFjsQJ8HmqQTGqLk9+0/4/CyEXEnwNqAWNYA2K2uLWuJb/WSiimxfcBc/p rIn+ObsIpkDnACG2jWRkE41GklcmaTexUTQetGRFVfYwrC73+4EQs32IKDVnJ+Rd2/yqwHgr i0kNwR8tu/5qIux4j0YVAwucQF43Mj2LmVhwCqHxHm4mVVJQQLJkS5ZA9wycKyze3Fm7k6h8 11i7laYKWiyvAgMBAAGjggGTMIIBjzAdBgNVHQ4EFgQUxkrbqy+gJYz6KplY/VQJigLNuzMw DgYDVR0PAQH/BAQDAgbAMB8GA1UdIwQYMBaAFI5KfYmhYxccgYg0VzcmRV4Zin4kMDMGA1Ud HwQsMCowKKAmoCSGImh0dHA6Ly9jcmwubGwubWl0LmVkdS9nZXRjcmwvTExDQTIwYgYIKwYB BQUHAQEEVjBUMC0GCCsGAQUFBzAChiFodHRwOi8vY3JsLmxsLm1pdC5lZHUvZ2V0dG8vTExD QTIwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmxsLm1pdC5lZHUvMAwGA1UdEwEB/wQCMAAw PQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIg4PlHYfsp2aGrYcVg+rwRYW2oR8dhcveMof/ inMCAWQCAQUwIgYDVR0lAQH/BBgwFgYIKwYBBQUHAwQGCisGAQQBgjcKAwwwGAYDVR0gBBEw DzANBgsqhkiG9xICAQMBCDAZBgNVHREEEjAQgQ51cmlAbGwubWl0LmVkdTANBgkqhkiG9w0B AQsFAAOCAQEAUpfpR1Sa9nInr3dVDOMvGcxg7GwHdSoCD9xCTXfPxqAkzI3UdOm6fLPUE7Wd XtaLsoInWIK/gP2uRTONUNbUScH21ia+J0UjZj5t2cbU+akefQkeobYXGAsa1BxIFSjaRQrq oLuZocef2ut8FjFeiU+YmNH4DAMGqtcg54Yq5PTdLVzZKJv8Z6vsJVcWgb/pLNIZ2dByb8K5 48A/rjUeJcBL/Gy0EveUYJAWTQvbCjZwFFdubfjoPDu2qFuhgAhAlER/fzTcq5bapjYnfEHZ /Yx6Tmg5hUl5zNhr6dQY7p3yb+koIiTz7gJCQFc/FZSGxfD4ScPTnCJZXhMPFOUbSDCCBLcw ggOfoAMCAQICARQwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1J VCBMaW5jb2xuIExhYm9yYXRvcnkxDDAKBgNVBAsTA1BLSTEWMBQGA1UEAxMNTUlUTEwgUm9v dCBDQTAeFw0wOTEyMTQxMjAwMDBaFw0xNTEyMzEyMzU5NTlaMFExCzAJBgNVBAYTAlVTMR8w HQYDVQQKExZNSVQgTGluY29sbiBMYWJvcmF0b3J5MQwwCgYDVQQLEwNQS0kxEzARBgNVBAMT Ck1JVExMIENBLTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCnBMsjYUiH7Deg MwcFYWZM6OknYzRgEO5gNgPE9JJnQgfDB+o1o1VTMBWcJYPXII4CyhLhDvSjfCvTPI4HmRDK Ip5UX5N2BCzwu7BJJMwUJHFaS4RMAC7nvYh6MIEixpl2aWCpkYX74b2CeDDQriGlqXCvxmg2 QhPlNmk4ONpL/80Kx9wKKhV/NThe54sFzZ2pz9YUEX5DE0a52hFvA19EzGhv7fUcucUjKy0z XPQ70LYwOWXLlpxAolKcgwRVsS6/cse8YH9fy8IAsXKAXikgQaFs5EJigLIDKPTKtRaf55yK sORSpoDrO1cvuntA5PnIH/qAFfACvGRTEK1RNLh9AgMBAAGjggGVMIIBkTASBgNVHRMBAf8E CDAGAQH/AgEAMB0GA1UdDgQWBBSOSn2JoWMXHIGINFc3JkVeGYp+JDAfBgNVHSMEGDAWgBRn qnrP9AqmuXK1iqDSnfIQw0PtKTAOBgNVHQ8BAf8EBAMCAYYwYQYIKwYBBQUHAQEEVTBTMC0G CCsGAQUFBzAChiFodHRwOi8vY3JsLmxsLm1pdC5lZHUvZ2V0dG8/TExSQ0EwIgYIKwYBBQUH MAGGFmh0dHA6Ly9vY3NwLmxsLm1pdC5lZHUwMwYDVR0fBCwwKjAooCagJIYiaHR0cDovL2Ny bC5sbC5taXQuZWR1L2dldGNybD9MTFJDQTCBkgYDVR0gBIGKMIGHMA0GCyqGSIb3EgIBAwEG MA0GCyqGSIb3EgIBAwEIMA0GCyqGSIb3EgIBAwEHMA0GCyqGSIb3EgIBAwEJMA0GCyqGSIb3 EgIBAwEKMA0GCyqGSIb3EgIBAwELMA0GCyqGSIb3EgIBAwEOMA0GCyqGSIb3EgIBAwEPMA0G CyqGSIb3EgIBAwEQMA0GCSqGSIb3DQEBCwUAA4IBAQCIdwah0P1x/Augwi/nhBq6Ds8QXAqk zSLZrL+DADWjk6HYFNo64x3Bo15c6oaW/GcTpZACt3StPa3OvsgAnKCtk81bQ0WV2MaL/0qm UYyN3bn1NiWrQD8aLAssv9aLY5dUylGOO1r37d9b3X+YtFytg0FRCfl5arYAYhU1SDCHwScD 2o67Is/qYBRGMIYcCcb7PH5UotBSwhO+1WCxIqD+YcRusyD3kEcc4dW6IG36YVhx7aIkw5AU meFH7xl0E1X+0I4Q+cmMNdMiArYx5rYG34AZB+f770fdjWPUUpTT82aphiiImutWyQpmoEWB snsX3nVTRdHCVi+Cf3Cx4YDWMIIDgzCCAmugAwIBAgIBATANBgkqhkiG9w0BAQUFADBUMQsw CQYDVQQGEwJVUzEfMB0GA1UEChMWTUlUIExpbmNvbG4gTGFib3JhdG9yeTEMMAoGA1UECxMD UEtJMRYwFAYDVQQDEw1NSVRMTCBSb290IENBMB4XDTA4MDkyMzEyMDAwMFoXDTI5MTIzMTIz NTk1OVowVDELMAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRvcnkx DDAKBgNVBAsTA1BLSTEWMBQGA1UEAxMNTUlUTEwgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBAMVOKRdYsiay+a2Kv1wQCoPd5AkwExuwcNDRhaRCdQN17K+lCCKv f9VSQToAsA6q1bACtZUcMv5ZKx8z5KG4jK9cM40NvEkf/bIOZAHJqzKgWG3N9NqrcAhimcXT XYQIdp1DgjtdADKVLAjXaYpD2PbpE/JbAPnqKzOENa3Py9CegB0abTlOyLgwXWY/rXTW+4L/ hipJ6+sI/ZtrFRmsKGhuwAKobFr0FDP6uIfx+RaWJcJ1QBIdgM4aohvW8JeriSSMyf/LlFpX TZFcM9SOX0f7wmsYi1yFuKFMnQbkSkxvnpBKMRxrg+98seSbbEnIkvB0C9qBDPLb/lQAvmpW 6oMCAwEAAaNgMF4wDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUZ6p6z/QKprlytYqg0p3y EMND7SkwHwYDVR0jBBgwFoAUZ6p6z/QKprlytYqg0p3yEMND7SkwCwYDVR0PBAQDAgGGMA0G CSqGSIb3DQEBBQUAA4IBAQA+G20FYNB4eNhKWF+PyT5DUtzlABFkf2IM2VGNUBova0GeKX3I 1Nf02qDU/GO2H9ETvnvTYhvfgQ4UB/5EImTkKPa7/TVG/MQ7SgmAmne8xELVbGLFrrytly8P yYtZtngb6DgeEUv+SwFnzcLO1vg1rdmss3kwsqy0q8e2VYAY8zTptEzyJG36aXcIMbqOxWS/ LbPjNuPdgJfO3d1WrHr1Etaaa0QRLqQoZj07dYY7Wo5EDqU+AUAMz9ZVRGK1s5b/jv5Wz/Yr oyqWFnH2KkNxRn9+2Ar7g3rnrOMZvp6psq2jbDXiPBod1wyMKn8x5y4cuGPNFcqjfyY/HX90 ivQAMIIEzjCCA7agAwIBAgIKLRt82QAAAABhCDANBgkqhkiG9w0BAQsFADBRMQswCQYDVQQG EwJVUzEfMB0GA1UEChMWTUlUIExpbmNvbG4gTGFib3JhdG9yeTEMMAoGA1UECxMDUEtJMRMw EQYDVQQDEwpNSVRMTCBDQS0yMB4XDTEzMDIyODE2MTcxNFoXDTE0MDIyODE2MTcxNFowYTEL MAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRvcnkxDzANBgNVBAsT BlBlb3BsZTEgMB4GA1UEAxMXQmx1bWVudGhhbC5VcmkuNTAwMTA1ODQwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQCqgQaJR3nurw/TB1Gm3yRezeYoc6BXhdtn9ZToWjJA044X 519aJBKnWyVpLdTgGMmT1uX48QQrKT6WT6QyIqPlpPqZpq9Ex+ZPKOfbk5Jl1Pw5SnceFZQb z1EIMgvz8JX2vhfMrr6DCDk1YIQY+F9ox/iTZTlLwWthnor6FhNLWCz0Rg+d5IPrTWfTzWSn w71hQb6iY8xmrtCJ5njGJUUx1Z6xQ4v26vSvAGLqg9NsAHdaHuQkTCEzDIyRZ9QzfA8+Bti3 sB40yHSTgORE1BQ1wa5+CwyitHq4sSb8NOW41tQ0OnE+QL+rW9anJYkbOzBWHvMbWgo3p1Q8 B8yGuZlnAgMBAAGjggGWMIIBkjAdBgNVHQ4EFgQUdbttDhxCbk/gVL/0gcb3CagQkHQwDgYD VR0PAQH/BAQDAgUgMB8GA1UdIwQYMBaAFI5KfYmhYxccgYg0VzcmRV4Zin4kMDMGA1UdHwQs MCowKKAmoCSGImh0dHA6Ly9jcmwubGwubWl0LmVkdS9nZXRjcmwvTExDQTIwYgYIKwYBBQUH AQEEVjBUMC0GCCsGAQUFBzAChiFodHRwOi8vY3JsLmxsLm1pdC5lZHUvZ2V0dG8vTExDQTIw IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmxsLm1pdC5lZHUvMAwGA1UdEwEB/wQCMAAwPQYJ KwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIg4PlHYfsp2aGrYcVg+rwRYW2oR8dhevQcIPr7SAC AWQCAQQwJQYDVR0lBB4wHAYEVR0lAAYIKwYBBQUHAwQGCisGAQQBgjcKAwQwGAYDVR0gBBEw DzANBgsqhkiG9xICAQMBCDAZBgNVHREEEjAQgQ51cmlAbGwubWl0LmVkdTANBgkqhkiG9w0B AQsFAAOCAQEAWHiBeNYY8PIHTsg1fyOX8E3PpnPiKvRyNpYEQ29ZWfgcEZo9OKtyeque14vn +t2jWRp+c7XQvmy0JUZO8Zz3RFFfjezTLfY6LCFWltJoRwGZRyhRC0SWOEsRzcFKrYFB/S5f NYjV69Id9UCNSnlSUTr+NxbVIczfs9TlbYstjamllfrms+XHhzH/xfLQ4bB8HOdxunlgsqBU 3jS7H7hpafBbWhL1Mt5685pAbj1hSAVy4bd1JkJSWi7O6M5Ca4KRp7l0XSZX6Au5h6eoy8IQ aC5xtxVNSUTWSI6ysoH0AzyZUH9nSu3iOM+sMYzKENqijk/pzM7vCDEb89M4S5ffhjGCAfUw ggHxAgEBMF8wUTELMAkGA1UEBhMCVVMxHzAdBgNVBAoTFk1JVCBMaW5jb2xuIExhYm9yYXRv cnkxDDAKBgNVBAsTA1BLSTETMBEGA1UEAxMKTUlUTEwgQ0EtMgIKZmfFegAAAABv3jANBglg hkgBZQMEAgEFAKBpMC8GCSqGSIb3DQEJBDEiBCBqmBmCFUVSO6kjiOuA4wDHq9ag3i1rDkrU U8rqYqMAtTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xMzA4 MjExODU2NTZaMA0GCSqGSIb3DQEBAQUABIIBAB3geM9arKEarGuU6NWqKOz8U/Dc8L3YK0MS vGu86Em6Traqrts0zNQgPQs2yJ6FxabG9h0w2SXjFqQfQTC5AhOE0vRy5+oheMu4wuOg+9r1 BB3WmKdzStJCkQl/95HrUo/n58yHlB9yTwp9da+yDQ2bQaXihgwPf0Ojx9QcURrlFOfWdBk1 dInKiIGzwFF40eBNWlAFoWKEQusdqrocigyJMQKRlsesBCZif5bk5hBBaRKtZ7C28hV0Qqoo AfLuWiHK5f/jJyZE/5BzD0HmN7D8NhFJbGs5NrqLHNqZHzwdKBiJFFhH0VDcDPZfXIFx8OOM uiwUNBH8TJAok5CDnUw= --B_3459941816_6204267-- From Andrei.Popov@microsoft.com Wed Aug 21 13:59:25 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D590D21F9F2B for ; Wed, 21 Aug 2013 13:59:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.599 X-Spam-Level: X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[AWL=-1.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LMHXqAp0YtRh for ; Wed, 21 Aug 2013 13:59:22 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0209.outbound.protection.outlook.com [207.46.163.209]) by ietfa.amsl.com (Postfix) with ESMTP id B0E3421F9FD5 for ; Wed, 21 Aug 2013 13:59:14 -0700 (PDT) Received: from BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) by BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) with Microsoft SMTP Server (TLS) id 15.0.745.25; Wed, 21 Aug 2013 20:59:04 +0000 Received: from BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.159]) by BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.218]) with mapi id 15.00.0745.000; Wed, 21 Aug 2013 20:59:03 +0000 From: Andrei Popov To: "tls@ietf.org" Thread-Topic: Prohibiting RC4 Cipher Suites Thread-Index: Ac6esIChBWliS7Z2TPWoD9XjLTgjuQ== Date: Wed, 21 Aug 2013 20:59:02 +0000 Message-ID: <2a98812c79804000ad1e74557a10125a@BL2PR03MB194.namprd03.prod.outlook.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [2001:4898:80e8:ed31::3] x-forefront-prvs: 0945B0CC72 x-forefront-antispam-report: SFV:NSPM; SFS:(26614003)(189002)(199002)(53754006)(4396001)(74316001)(65816001)(69226001)(56776001)(59766001)(77982001)(76482001)(54316002)(54356001)(74706001)(53806001)(47736001)(47976001)(81542001)(49866001)(76796001)(80022001)(15202345003)(76176001)(50986001)(81342001)(76576001)(74366001)(76786001)(81686001)(31966008)(16236675002)(74876001)(19580385001)(80976001)(19300405004)(51856001)(46102001)(83072001)(77096001)(56816003)(74662001)(33646001)(19580395003)(47446002)(83322001)(81816001)(79102001)(63696002)(74502001)(24736002)(3826001); DIR:OUT; SFP:; SCL:1; SRVR:BL2PR03MB194; H:BL2PR03MB194.namprd03.prod.outlook.com; CLIP:2001:4898:80e8:ed31::3; RD:InfoNoRecords; MX:1; A:1; LANG:en; Content-Type: multipart/alternative; boundary="_000_2a98812c79804000ad1e74557a10125aBL2PR03MB194namprd03pro_" MIME-Version: 1.0 X-OriginatorOrg: DuplicateDomain-a84fc36a-4ed7-4e57-ab1c-3e967bcbad48.microsoft.com X-MS-Exchange-CrossPremises-AuthAs: Internal X-MS-Exchange-CrossPremises-AuthMechanism: 03 X-MS-Exchange-CrossPremises-AuthSource: BL2PR03MB194.namprd03.prod.outlook.com X-MS-Exchange-CrossPremises-SCL: 1 X-MS-Exchange-CrossPremises-messagesource: StoreDriver X-MS-Exchange-CrossPremises-BCC: X-MS-Exchange-CrossPremises-originalclientipaddress: 2001:4898:80e8:ed31::3 X-MS-Exchange-CrossPremises-avstamp-service: 1.0 X-MS-Exchange-CrossPremises-antispam-scancontext: DIR:Originating; SFV:NSPM; SKIP:0; X-MS-Exchange-CrossPremises-processed-by-journaling: Journal Agent X-MS-Exchange-CrossPremises-ContentConversionOptions: False; 00160000; True; ; iso-8859-1 X-OrganizationHeadersPreserved: BL2PR03MB194.namprd03.prod.outlook.com Subject: [TLS] Prohibiting RC4 Cipher Suites X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 20:59:25 -0000 --_000_2a98812c79804000ad1e74557a10125aBL2PR03MB194namprd03pro_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hello All, RC4 is a widely deployed cipher, which is commonly preferred by TLS servers= : our tests show ~40% of the high-traffic HTTPS sites pick RC4 if IE offers= this cipher. A significant percentage of web sites and e-mail servers have= only RC4 enabled, so a client cannot altogether disable RC4 without breaki= ng interoperability. At the same time, attacks on RC4 are improving (e.g. h= ttp://www.isg.rhul.ac.uk/tls/), to the point that practical exploits are po= ssible. I have posted a new Internet-Draft "Prohibiting RC4 Cipher Suites" (draft-p= opov-tls-prohibiting-rc4-00) to deprecate the use of RC4 cipher suites in TLS. Looking forward to comments and feedback on the draft, Andrei Popov --_000_2a98812c79804000ad1e74557a10125aBL2PR03MB194namprd03pro_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hello All,

 

RC4 is a widely deployed cipher, which is commonly p= referred by TLS servers: our tests show ~40% of the high-traffic HTTPS site= s pick RC4 if IE offers this cipher. A significant percentage of web sites = and e-mail servers have only RC4 enabled, so a client cannot altogether disable RC4 without breaking interoperabilit= y. At the same time, attacks on RC4 are improving (e.g. http://www.isg= .rhul.ac.uk/tls/), to the point that practical exploits are possible.

 

I have posted a new Internet-Draft “Prohibitin= g RC4 Cipher Suites” (draft-popov-tls-prohibiting-rc4-00) to de= precate the use of RC4 cipher suites in TLS.

 

Looking forward to comments and feedback on the draf= t,

 

Andrei Popov

--_000_2a98812c79804000ad1e74557a10125aBL2PR03MB194namprd03pro_-- From Kenny.Paterson@rhul.ac.uk Wed Aug 21 14:13:21 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A09F721F9D7C for ; Wed, 21 Aug 2013 14:13:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.533 X-Spam-Level: X-Spam-Status: No, score=0.533 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, UNRESOLVED_TEMPLATE=3.132] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AzWH7nw0e0nw for ; Wed, 21 Aug 2013 14:13:16 -0700 (PDT) Received: from db8outboundpool.messaging.microsoft.com (mail-db8lp0189.outbound.messaging.microsoft.com [213.199.154.189]) by ietfa.amsl.com (Postfix) with ESMTP id 8B23D21F9D7B for ; Wed, 21 Aug 2013 14:13:15 -0700 (PDT) Received: from mail186-db8-R.bigfish.com (10.174.8.249) by DB8EHSOBE019.bigfish.com (10.174.4.82) with Microsoft SMTP Server id 14.1.225.22; Wed, 21 Aug 2013 21:13:14 +0000 Received: from mail186-db8 (localhost [127.0.0.1]) by mail186-db8-R.bigfish.com (Postfix) with ESMTP id 5FC28B00121 for ; Wed, 21 Aug 2013 21:13:14 +0000 (UTC) X-Forefront-Antispam-Report: CIP:134.219.208.107; KIP:(null); UIP:(null); IPV:NLI; H:EXCH-HUB01.cc.rhul.local; RD:exch-hub01.rhul.ac.uk; EFVD:NLI X-SpamScore: -29 X-BigFish: VPS-29(zzbb2dI98dI1432Ia65R14ffId997mzz1f42h208ch1ee6h1de0h1d18h1fdah2073h1202h1e76h1d1ah1d2ah1fc6hz97hz1de098h1033IL17326ah1de096h18602eh8275bh8275dh1de097hz2dh2a8h683h839h947he5bhf0ah1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h1b0ah1d0ch1d2eh1d3fh1dc1h1dfeh1dffh1e1dh1fe8h1ff5h1155h) X-Forefront-Antispam-Report-Untrusted: CIP:157.56.248.133; KIP:(null); UIP:(null); (null); H:AMXPRD0310HT002.eurprd03.prod.outlook.com; R:internal; EFV:INT Received: from mail186-db8 (localhost.localdomain [127.0.0.1]) by mail186-db8 (MessageSwitch) id 1377119592919377_9899; Wed, 21 Aug 2013 21:13:12 +0000 (UTC) Received: from DB8EHSMHS031.bigfish.com (unknown [10.174.8.229]) by mail186-db8.bigfish.com (Postfix) with ESMTP id D222F40041 for ; Wed, 21 Aug 2013 21:13:12 +0000 (UTC) Received: from EXCH-HUB01.cc.rhul.local (134.219.208.107) by DB8EHSMHS031.bigfish.com (10.174.4.41) with Microsoft SMTP Server (TLS) id 14.16.227.3; Wed, 21 Aug 2013 21:13:12 +0000 Received: from db9outboundpool.messaging.microsoft.com (134.219.208.67) by hybrid.rhul.ac.uk (134.219.208.107) with Microsoft SMTP Server (TLS) id 14.2.328.9; Wed, 21 Aug 2013 22:13:12 +0100 Received: from mail220-db9-R.bigfish.com (10.174.16.244) by DB9EHSOBE033.bigfish.com (10.174.14.96) with Microsoft SMTP Server id 14.1.225.22; Wed, 21 Aug 2013 21:13:11 +0000 Received: from mail220-db9 (localhost [127.0.0.1]) by mail220-db9-R.bigfish.com (Postfix) with ESMTP id 953A3800CF for ; Wed, 21 Aug 2013 21:13:11 +0000 (UTC) Received: from mail220-db9 (localhost.localdomain [127.0.0.1]) by mail220-db9 (MessageSwitch) id 137711959026522_18506; Wed, 21 Aug 2013 21:13:10 +0000 (UTC) Received: from DB9EHSMHS031.bigfish.com (unknown [10.174.16.251]) by mail220-db9.bigfish.com (Postfix) with ESMTP id 038B720045; Wed, 21 Aug 2013 21:13:10 +0000 (UTC) Received: from AMXPRD0310HT002.eurprd03.prod.outlook.com (157.56.248.133) by DB9EHSMHS031.bigfish.com (10.174.14.41) with Microsoft SMTP Server (TLS) id 14.16.227.3; Wed, 21 Aug 2013 21:13:09 +0000 Received: from AMXPRD0310MB377.eurprd03.prod.outlook.com ([169.254.2.159]) by AMXPRD0310HT002.eurprd03.prod.outlook.com ([10.255.55.37]) with mapi id 14.16.0347.000; Wed, 21 Aug 2013 21:13:08 +0000 From: "Paterson, Kenny" To: Andrei Popov , "tls@ietf.org" Thread-Topic: [TLS] Prohibiting RC4 Cipher Suites Thread-Index: Ac6esIChBWliS7Z2TPWoD9XjLTgjuf//kBKA Date: Wed, 21 Aug 2013 21:13:07 +0000 Message-ID: In-Reply-To: <2a98812c79804000ad1e74557a10125a@BL2PR03MB194.namprd03.prod.outlook.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [10.255.55.4] Content-Type: text/plain; charset="iso-8859-1" Content-ID: <6CE087FA8AEAA14D82E72135C319B946@eurprd03.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn% X-FOPE-CONNECTOR: Id%36694$Dn%MICROSOFT.COM$RO%2$TLS%5$FQDN%hybrid.rhul.ac.uk$TlsDn%hybrid.rhul.ac.uk X-FOPE-CONNECTOR: Id%36694$Dn%IETF.ORG$RO%2$TLS%5$FQDN%hybrid.rhul.ac.uk$TlsDn%hybrid.rhul.ac.uk X-OriginatorOrg: rhul.ac.uk X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn% Subject: Re: [TLS] Prohibiting RC4 Cipher Suites X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 21:13:21 -0000 Andrei, Your intro says: "Recent cryptanalysis results [ALF] exploit biases in the RC4 keystream to recover early portions of plaintexts." The attacks can recover repeated plaintext from ANYWHERE in the plaintext stream, so they are more flexible in application than your text suggests. Another (better?) link for the attacks by AlFardan et al. is www.isg.rhul.ac.uk/tls. The "official" USENIX link, which should be long-lasting, is: https://www.usenix.org/conference/usenixsecurity13/security-rc4-tls Best wishes Kenny On 21/08/2013 13:59, "Andrei Popov" wrote: >Hello All, >=20 >RC4 is a widely deployed cipher, which is commonly preferred by TLS >servers: our tests show ~40% of the high-traffic HTTPS sites pick RC4 if >IE offers this cipher. A significant percentage of web sites and e-mail >servers have only RC4 enabled, > so a client cannot altogether disable RC4 without breaking >interoperability. At the same time, attacks on RC4 are improving (e.g. >http://www.isg.rhul.ac.uk/tls/), to the point that practical exploits are >possible. >=20 >I have posted a new Internet-Draft =B3Prohibiting RC4 Cipher Suites=B2 >(draft-popov-tls-prohibiting-rc4-00 >) to >deprecate the use of RC4 cipher suites in TLS. >=20 >Looking forward to comments and feedback on the draft, >=20 >Andrei Popov > From foleyj@cisco.com Wed Aug 21 12:08:34 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2872C11E8133 for ; Wed, 21 Aug 2013 12:08:34 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.599 X-Spam-Level: X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VUo7HR-EDEEv for ; Wed, 21 Aug 2013 12:08:28 -0700 (PDT) Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id 175F711E8122 for ; Wed, 21 Aug 2013 12:08:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1929; q=dns/txt; s=iport; t=1377112108; x=1378321708; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=MsBAzQM+MxkDXuTjuKQbUPs9E8b9HIeD24M0JBW5SlQ=; b=m5njj59zyR1lH/ni0qZlyk6pCeNZieJDHT7uUXed3+z9BPtUS+D08PPP /Q1Ce/N25JF25syfIrH1dr6Et3uvRQT1GJG5UChpfu8tIwTI7T9i9tfkO d+HumZ5KK2ABEadJPqX09x6T5g301MjhdSlMkWOFtseBM84ipzgP9ynVF I=; X-IronPort-AV: E=Sophos;i="4.89,929,1367971200"; d="scan'208";a="250116072" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-7.cisco.com with ESMTP; 21 Aug 2013 19:08:27 +0000 Received: from [64.102.54.158] (dhcp-64-102-54-158.cisco.com [64.102.54.158]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id r7LJ8Rgx005104; Wed, 21 Aug 2013 19:08:27 GMT Message-ID: <5215102B.30200@cisco.com> Date: Wed, 21 Aug 2013 15:08:27 -0400 From: John Foley User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130803 Thunderbird/17.0.8 MIME-Version: 1.0 To: Wan-Teh Chang References: In-Reply-To: X-Enigmail-Version: 1.5.2 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Mailman-Approved-At: Wed, 21 Aug 2013 14:18:52 -0700 Cc: "tls@ietf.org" , Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 19:08:34 -0000 Agreed, RFC 5246 section 6.2.3.3 is written for AEAD ciphers that grow the payload by a fixed length. [draft-mcgrew-aead-aes-cbc-hmac-sha2] grows the payload by a variable length because CBC mode is used. The only way to use this with TLS 1.2 would be to violate the spec by increasing the TLSCompressed.length by the pad value prior to encrypting. Then when decrypting we would have the appropriate value for the additional data input. It seems that [draft-mcgrew-aead-aes-cbc-hmac-sha2] needs to include a section to revise RFC 5246, or another draft is required that revises 5246 to allow use of variable pad length AEAD ciphers. On 08/21/2013 01:49 PM, Wan-Teh Chang wrote: > While reviewing the NSS patch for the AES-GCM TLS cipher suites, my > colleague Ryan Sleevi noticed that the AEAD algorithms defined in > draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD > ciphers. The problem is how TLS 1.2 specifies the additional > authenticated data for AEAD ciphers: > > RFC 5246 Section 6.2.3.3 says: > > The plaintext is the TLSCompressed.fragment. > > The additional authenticated data, which we denote as > additional_data, is defined as follows: > > additional_data = seq_num + TLSCompressed.type + > TLSCompressed.version + TLSCompressed.length; > > where "+" denotes concatenation. > > So additional_data includes the length of the plaintext > (TLSCompressed.length). But a TLS 1.2 record only gives us the length > of the AEAD ciphertext. So the recipient needs to calculate the > plaintext's length using only the ciphertext. > > This is difficult to do with the AEAD algorithms in > draft-mcgrew-aead-aes-cbc-hmac-sha2 because the amount of padding, and > therefore the plaintext length, is only known after CBC decryption. > > Is this a known problem with TLS 1.2 AEAD ciphers? > > Wan-Teh Chang > . > From prvs=194521709e=uri@ll.mit.edu Wed Aug 21 14:21:50 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AED811E812B for ; Wed, 21 Aug 2013 14:21:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.723 X-Spam-Level: X-Spam-Status: No, score=-5.723 tagged_above=-999 required=5 tests=[AWL=0.124, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_OBFU_ALL=0.751, UNPARSEABLE_RELAY=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wSHPCpybKQu5 for ; Wed, 21 Aug 2013 14:21:44 -0700 (PDT) Received: from mx2.ll.mit.edu (MX2.LL.MIT.EDU [129.55.12.46]) by ietfa.amsl.com (Postfix) with ESMTP id C021D21F9E98 for ; Wed, 21 Aug 2013 14:21:44 -0700 (PDT) Received: from LLE2K7-HUB02.mitll.ad.local (LLE2K7-HUB02.mitll.ad.local) by mx2.ll.mit.edu (unknown) with ESMTP id r7LLLaAq024045; Wed, 21 Aug 2013 17:21:42 -0400 From: "Blumenthal, Uri - 0558 - MITLL" To: "'foleyj@cisco.com'" , "'wtc@google.com'" Date: Wed, 21 Aug 2013 17:21:41 -0400 Thread-Topic: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers Thread-Index: Ac6etArI4JNUxxsSRP+UPjB3aQvYKwAAB1Rl In-Reply-To: <5215102B.30200@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.10.8794, 1.0.431, 0.0.0000 definitions=2013-08-21_08:2013-08-21, 2013-08-21, 1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1308210171 Message-Id: <20130821212144.C021D21F9E98@ietfa.amsl.com> Cc: "'tls@ietf.org'" , "'sleevi@google.com'" Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Aug 2013 21:21:51 -0000 How many AEAD modes do we care to have? -- Regards, Uri Blumenthal Voice: (781) 981-1638 Cyber Systems and Technology Fax: (781) 981-0186 MIT Lincoln Laboratory Cell: (339) 223-5363 244 Wood Street Email: Lexington, MA 02420-9185 =20 Web: http://www.ll.mit.edu/CST/ =20 MIT LL Root CA:=20 DSN: 478-5980 ask Lincoln ext.1638 ----- Original Message ----- From: John Foley [mailto:foleyj@cisco.com] Sent: Wednesday, August 21, 2013 03:08 PM=0A= To: Wan-Teh Chang Cc: tls@ietf.org ; Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS= 1.2 AEAD ciphers Agreed, RFC 5246 section 6.2.3.3 is written for AEAD ciphers that grow the payload by a fixed length. [draft-mcgrew-aead-aes-cbc-hmac-sha2] grows the payload by a variable length because CBC mode is used. The only way to use this with TLS 1.2 would be to violate the spec by increasing the TLSCompressed.length by the pad value prior to encrypting. Then when decrypting we would have the appropriate value for the additional data input. It seems that [draft-mcgrew-aead-aes-cbc-hmac-sha2] needs to include a section to revise RFC 5246, or another draft is required that revises 5246 to allow use of variable pad length AEAD ciphers. On 08/21/2013 01:49 PM, Wan-Teh Chang wrote: > While reviewing the NSS patch for the AES-GCM TLS cipher suites, my > colleague Ryan Sleevi noticed that the AEAD algorithms defined in > draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD > ciphers. The problem is how TLS 1.2 specifies the additional > authenticated data for AEAD ciphers: > > RFC 5246 Section 6.2.3.3 says: > > The plaintext is the TLSCompressed.fragment. > > The additional authenticated data, which we denote as > additional_data, is defined as follows: > > additional_data =3D seq_num + TLSCompressed.type + > TLSCompressed.version + TLSCompressed.length; > > where "+" denotes concatenation. > > So additional_data includes the length of the plaintext > (TLSCompressed.length). But a TLS 1.2 record only gives us the length > of the AEAD ciphertext. So the recipient needs to calculate the > plaintext's length using only the ciphertext. > > This is difficult to do with the AEAD algorithms in > draft-mcgrew-aead-aes-cbc-hmac-sha2 because the amount of padding, and > therefore the plaintext length, is only known after CBC decryption. > > Is this a known problem with TLS 1.2 AEAD ciphers? > > Wan-Teh Chang > . > _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls From juhovh@gmail.com Wed Aug 21 18:17:46 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DC6D11E81AB for ; Wed, 21 Aug 2013 18:17:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.299 X-Spam-Level: X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NZOulqMdaiMa for ; Wed, 21 Aug 2013 18:17:46 -0700 (PDT) Received: from mail-lb0-x230.google.com (mail-lb0-x230.google.com [IPv6:2a00:1450:4010:c04::230]) by ietfa.amsl.com (Postfix) with ESMTP id 87DA921F8424 for ; Wed, 21 Aug 2013 18:17:45 -0700 (PDT) Received: by mail-lb0-f176.google.com with SMTP id w10so1209038lbi.35 for ; Wed, 21 Aug 2013 18:17:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=Qrpy9F9FT/Mr7/Ahrz6k/ffWrD90KiH3hQ4utP7sPw4=; b=LB0YdGahVdrXb4QZOGi4dSb5l2AMhTh8v8aBsYIBm2wZWfB7Qs7YW7u4cJ2OF/f6A4 INwGBewV+8R9OcbCNQVn1+UqemVVBFZKfLhx2PJGPdurAYBni/3mSdWnijN+ftzc5Py+ pikije9W/S00kGm5m5np3LCSzgxuyNBPBHS6rD+wCs5TOMny5gW2e+aIZDR3qUDqCLBH MJktCpoLhyXx3+OgD4IQXUf7Isesl+Yw48n+MYOn91n2vrwx5bsfOrTIBnvW3hS2V1ju QreFxvKl3DOVNjSFU2Cm98o8mQyhRTf3fmEdxYHS7r4u3j+j9PSnLF7G3NHsGX2h42DZ CKcA== MIME-Version: 1.0 X-Received: by 10.112.154.70 with SMTP id vm6mr566553lbb.1.1377134264456; Wed, 21 Aug 2013 18:17:44 -0700 (PDT) Received: by 10.114.4.20 with HTTP; Wed, 21 Aug 2013 18:17:44 -0700 (PDT) In-Reply-To: References: Date: Thu, 22 Aug 2013 09:17:44 +0800 Message-ID: From: =?ISO-8859-1?Q?Juho_V=E4h=E4=2DHerttua?= To: Adam Langley Content-Type: multipart/alternative; boundary=089e0115f5a4a41bad04e47f0e48 X-Mailman-Approved-At: Wed, 21 Aug 2013 20:29:56 -0700 Cc: "foleyj@cisco.com" , "tls@ietf.org" , Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Aug 2013 01:17:46 -0000 --089e0115f5a4a41bad04e47f0e48 Content-Type: text/plain; charset=ISO-8859-1 On Thursday, August 22, 2013, Adam Langley wrote: > On Wed, Aug 21, 2013 at 1:49 PM, Wan-Teh Chang > > wrote: > > Is this a known problem with TLS 1.2 AEAD ciphers? > > I hit the same issue while planning to move OpenSSL's TLS CBC decoding > into EVP (a lower-layer of OpenSSL). I couldn't figure out a way > around it and gave up. I came across this a few years ago and finally ended up just writing errata 2390, which simply removes the confusing notion of padding from the specification, because padding didn't seem to be possible. Personally I think the AEAD interface of TLS is broken, but people on this list were not concerned at the time, because it is "only used for GCM anyway". I can understand that, since fixing it now is not trivial. Patching the specification in some other document easily leads to confusion, especially when the original document states that padding should be possible, and therefore the patch should not even be necessary. Juho --089e0115f5a4a41bad04e47f0e48 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable On Thursday, August 22, 2013, Adam Langley wrote:
On Wed, Aug 21, 2013 at 1:49 PM, Wan-Teh Chang <= wtc@google.com> wrote:
> Is this a known problem with TLS 1.2 AEAD ciphers?

I hit the same issue while planning to move OpenSSL's TLS CBC decoding<= br> into EVP (a lower-layer of OpenSSL). I couldn't figure out a way
around it and gave up.

I came across this a= =A0few years ago and finally ended up just=A0writing errata 2390, which sim= ply removes the confusing notion of padding from the specification, because= padding didn't seem to be possible.
Personally I think the AEAD interface of=A0TLS is broken, but people = on this list were not concerned at the time, because it is "only used = for GCM anyway". I can understand that, since=A0fixing it now=A0is not= trivial. Patching the specification=A0in some other document easily leads = to confusion, especially when the original document states that padding sho= uld be possible, and therefore the patch should not even be ne= cessary.

Juho
--089e0115f5a4a41bad04e47f0e48-- From yaronf.ietf@gmail.com Thu Aug 22 00:35:47 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C990E11E80E0 for ; Thu, 22 Aug 2013 00:35:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.599 X-Spam-Level: X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IzPMmVhPV74c for ; Thu, 22 Aug 2013 00:35:47 -0700 (PDT) Received: from mail-wg0-x233.google.com (mail-wg0-x233.google.com [IPv6:2a00:1450:400c:c00::233]) by ietfa.amsl.com (Postfix) with ESMTP id 7831F21F9FE5 for ; Thu, 22 Aug 2013 00:35:43 -0700 (PDT) Received: by mail-wg0-f51.google.com with SMTP id a12so1250497wgh.6 for ; Thu, 22 Aug 2013 00:35:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; bh=vR5GQZqPg/gDRNYlyDoTnqTR1mETxpOJV9388/j2Yrg=; b=YSF1x1llm5qq31HYueKnoUPB6VykW+nV3qP2x5M09Lay/AN/iWVWi1RpNxlH7UxNfH N9GWt1UfP4u05qqh2/LA5gfcfIyJQ86KA82WuLf0gSinDNvsjp5PEbE+D9rknNyPjorO is7+B1JxTL0qIRAkRh2fEoue669fkaUUJjksD5FcKLVrjNKVqzdNOQMyH92PlchWMuc5 8EJQQLnwhXZWa0Y/5gweDg7qrvyPV/4oT3xsOIbOsWbCykIEuRT09D3sflvP3OcqKetf ijPc40wHaYmnRC9baKBG9VY0UGs4y7w6q5xD31KNkFzwSKLPWLfvEQvMCOQ28S9OGv9g qEZQ== X-Received: by 10.180.189.37 with SMTP id gf5mr8643119wic.31.1377156940224; Thu, 22 Aug 2013 00:35:40 -0700 (PDT) Received: from [10.0.0.145] (46-116-127-98.bb.netvision.net.il. [46.116.127.98]) by mx.google.com with ESMTPSA id i5sm36348884wiw.7.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 22 Aug 2013 00:35:39 -0700 (PDT) Message-ID: <5215BF4A.7020909@gmail.com> Date: Thu, 22 Aug 2013 10:35:38 +0300 From: Yaron Sheffer User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130804 Thunderbird/17.0.8 MIME-Version: 1.0 To: tls@ietf.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: [TLS] Prohibiting RC4 Cipher Suites X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Aug 2013 07:35:47 -0000 Hi Andrei, Thank you for the new draft. While I agree with the motivation and with the first two recommendations (do not offer RC4, do not accept RC4 - if possible!) I disagree that it is better to completely reject a client that offers only RC4, because the intuitive fallback for Web users is simply, don't do TLS. In a world of pervasive passive surveillance (see https://www.ietf.org/mailman/listinfo/perpass), we would prefer sessions to be encrypted even if it means that an active attacker, working hard, can break into them. And yes, the is the age old "false sense of security" discussion, yet again. Thanks, Yaron From sfriedl@cisco.com Thu Aug 22 14:19:07 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EFD521F9E6C for ; Thu, 22 Aug 2013 14:19:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.599 X-Spam-Level: X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S3ZdQouIokBC for ; Thu, 22 Aug 2013 14:19:02 -0700 (PDT) Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) by ietfa.amsl.com (Postfix) with ESMTP id 72A3121F9E62 for ; Thu, 22 Aug 2013 14:19:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4013; q=dns/txt; s=iport; t=1377206342; x=1378415942; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=kZBmmz76s3zqwx/svk3ozReBJ5UyFHtMe7fLFHBsC8w=; b=gjJDacxbgokXJfz10aWYxt71Nw3SKFShzwXVPb5DN3z90XKERg4lVRrO BUxoRDRwFpQGb4rQ3FtophRqF/ZIITiNtomJA+mmLP0tdNKu8wxgddfzU eGoi39qs95GMqz0zvxiuElsyFC68BSrp3DNb+bmIHOAXLhNrcQKrrgF/A 0=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Ai4FAO1+FlKtJV2b/2dsb2JhbABRCYMHNVHAC4EdFnSCJAEBAQMBAQEBNzQLBQcEAgEIDgMEAQEBChQJByEGCxQJCAIEAQ0FCId2AwkGDK0LDYlkBI1tgTeBEQYrBwaDFXsDlX2OGoUpgx+CKw X-IronPort-AV: E=Sophos;i="4.89,936,1367971200"; d="scan'208";a="250675738" Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-6.cisco.com with ESMTP; 22 Aug 2013 21:19:02 +0000 Received: from xhc-rcd-x09.cisco.com (xhc-rcd-x09.cisco.com [173.37.183.83]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id r7MLJ17Q001306 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 22 Aug 2013 21:19:01 GMT Received: from xmb-aln-x02.cisco.com ([169.254.5.221]) by xhc-rcd-x09.cisco.com ([173.37.183.83]) with mapi id 14.02.0318.004; Thu, 22 Aug 2013 16:19:01 -0500 From: "Stephan Friedl (sfriedl)" To: Yoav Nir , Martin Thomson Thread-Topic: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 Thread-Index: AQHOnQaJiiNSmnaz+UqY440lb15QR5mdfoCAgABuvoCAALg6gIAAFx8AgAAQr4CAABA3gIAAFtiAgAK+wFA= Date: Thu, 22 Aug 2013 21:19:01 +0000 Message-ID: <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C13EC7C62@xmb-aln-x02.cisco.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> <073b3285216c4e7b8879cd9cefc4c423@BL2PR03MB194.namprd03.prod.outlook.com> <383DCBA8-194B-461B-BB8D-45CC501DEDD8@checkpoint.com> In-Reply-To: <383DCBA8-194B-461B-BB8D-45CC501DEDD8@checkpoint.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.94.178.44] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Aug 2013 21:19:07 -0000 If I roll up the comments I think we have settled on just about everything: 1. We will fix the typos. 2. We will remove the HTTP/2.0 registration. Martin can add the registrati= on to the IANA Considerations section of the HTTP/2.0 draft. 3. We will leave the lower-case HTTP/1.1 protocol ID as it is. The one open issue is the 'exp' prefix for experimental ALPN protocol IDs. = In reviewing RFC 6648, it seems to speak more directly protocol parameters= and not so much to arguments supplied to those parameters. In our case, A= LPN specifies that a new parameter for the TLS protocol - "application_laye= r_protocol_negotiation" be entered into the IANA TLS extension registry. T= he ALPN draft does not propose any experimental extensions or specify prefi= xes for experimental extensions. It is fully aligned with RFC 6648 in that= respect. The registry of "Application Layer Protocol Negotiation protocol= byte strings" requested from the IANA is a set of identifiers for ALPN to = serve as arguments to the new extension. Those identifiers then map to spe= cific protocols, much the same as port numbers mapping to protocols. It is= certainly a great idea to have the ALPN protocol byte string identically m= atch the protocol name - but that is not a requirement.=20 With regard to the 'exp' prefix for ALPN protocol byte strings, RFC6648 ide= ntifies leakage of experimental protocol parameters into the protected, sta= ndardized namespace as the primary problem with 'X-' prefix notation. I th= ink this may be less of a problem for the ALPN opaque protocol identifiers,= as they are protocol identifiers and do not map to unique features or func= tions within a protocol. Interop is simple, either an implementation suppo= rts the protocol or not. An 'exp' prefixed protocol identifier does not ch= ange the behavior of the TLS protocol, all it does it impact the identity o= f the service which terminates the TLS connection. If an experimental prot= ocol ends up being promoted to a standard, then the appropriate opaque iden= tifier will be registered at that point. Also, there is no recommendation = in the draft against registering experimental protocols either. I'd suggest that we leave the 'exp' namespace in the draft and add a statem= ent urging anyone choosing to avail themselves of an 'exp' prefixed opaque = protocol identifier to review RFC6648 and make sure they are doing the righ= t thing. The 'exp' namespace has been explicitly requested by a number of = TLS working group members, so I'm hesitant to remove it without more voices= calling out for its removal. Does this sound reasonable? Thanks, Stephan -----Original Message----- From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Yoav = Nir Sent: Tuesday, August 20, 2013 3:36 PM To: Martin Thomson Cc: tls@ietf.org Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 On Aug 20, 2013, at 11:14 PM, Martin Thomson wro= te: > On 20 August 2013 12:16, Andrei Popov wrote: >> The convenience of harmonizing the HTTP/1.1 protocol ID is clear to me. = Unfortunately, the current lower-case ID is already used, e.g. by MS client= s and Google servers. We could add an alternative, upper-case version of th= e ID in the draft, but in practice the lower-case version will remain deplo= yed/supported for years to come. I doubt that the benefits of "harmonizatio= n" would outweigh the resulting confusion and the extra bytes in the Client= Hello, so perhaps it's better to keep the existing lower-case HTTP/1.1 prot= ocol ID. >=20 > Sounds like a good enough reason to keep the http/1.1 registration=20 > lowercase. Doubling up is almost guaranteed to cause more confusion=20 > than a mere case shift. +1 _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls From Andrei.Popov@microsoft.com Thu Aug 22 15:31:14 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26F5011E8122 for ; Thu, 22 Aug 2013 15:31:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.265 X-Spam-Level: X-Spam-Status: No, score=-4.265 tagged_above=-999 required=5 tests=[AWL=-0.666, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kvlHis9FZEb9 for ; Thu, 22 Aug 2013 15:31:10 -0700 (PDT) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2lp0240.outbound.protection.outlook.com [207.46.163.240]) by ietfa.amsl.com (Postfix) with ESMTP id 2E65911E8153 for ; Thu, 22 Aug 2013 15:31:06 -0700 (PDT) Received: from BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) by BL2PR03MB195.namprd03.prod.outlook.com (10.255.230.153) with Microsoft SMTP Server (TLS) id 15.0.745.25; Thu, 22 Aug 2013 22:15:58 +0000 Received: from BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.159]) by BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.218]) with mapi id 15.00.0745.000; Thu, 22 Aug 2013 22:15:58 +0000 From: Andrei Popov To: "Paterson, Kenny" , "tls@ietf.org" Thread-Topic: [TLS] Prohibiting RC4 Cipher Suites Thread-Index: Ac6esIChBWliS7Z2TPWoD9XjLTgjuf//kBKA//3o8CA= Date: Thu, 22 Aug 2013 22:15:57 +0000 Message-ID: References: <2a98812c79804000ad1e74557a10125a@BL2PR03MB194.namprd03.prod.outlook.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [2001:4898:80e0:ed43::3] x-forefront-prvs: 0946DC87A1 x-forefront-antispam-report: SFV:NSPM; SFS:(26614003)(13464003)(189002)(199002)(51704005)(24454002)(479174003)(53754006)(377454003)(65816001)(59766001)(77982001)(80022001)(51856001)(47976001)(46102001)(74366001)(33646001)(19580395003)(19580405001)(76796001)(83322001)(81816001)(76786001)(81686001)(63696002)(53806001)(76576001)(83072001)(49866001)(74316001)(31966008)(81542001)(4396001)(69226001)(15974865002)(74876001)(56776001)(47736001)(56816003)(74706001)(50986001)(79102001)(80976001)(47446002)(76482001)(54316002)(77096001)(54356001)(81342001)(74662001)(74502001)(557034004)(3826001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BL2PR03MB195; H:BL2PR03MB194.namprd03.prod.outlook.com; CLIP:2001:4898:80e0:ed43::3; RD:InfoNoRecords; MX:1; A:1; LANG:en; Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: DuplicateDomain-a84fc36a-4ed7-4e57-ab1c-3e967bcbad48.microsoft.com Subject: Re: [TLS] Prohibiting RC4 Cipher Suites X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Aug 2013 22:31:14 -0000 Hi Kenny, Thanks for your comments; I will update the attack description and the link= in the next revision of the draft. Cheers, Andrei -----Original Message----- From: Paterson, Kenny [mailto:Kenny.Paterson@rhul.ac.uk]=20 Sent: Wednesday, August 21, 2013 2:13 PM To: Andrei Popov; tls@ietf.org Subject: Re: [TLS] Prohibiting RC4 Cipher Suites Andrei, Your intro says: "Recent cryptanalysis results [ALF] exploit biases in the RC4 keystream to = recover early portions of plaintexts." The attacks can recover repeated plaintext from ANYWHERE in the plaintext s= tream, so they are more flexible in application than your text suggests. Another (better?) link for the attacks by AlFardan et al. is www.isg.rhul.a= c.uk/tls. The "official" USENIX link, which should be long-lasting, is: https://www.usenix.org/conference/usenixsecurity13/security-rc4-tls Best wishes Kenny On 21/08/2013 13:59, "Andrei Popov" wrote: >Hello All, >=20 >RC4 is a widely deployed cipher, which is commonly preferred by TLS >servers: our tests show ~40% of the high-traffic HTTPS sites pick RC4=20 >if IE offers this cipher. A significant percentage of web sites and=20 >e-mail servers have only RC4 enabled, so a client cannot altogether=20 >disable RC4 without breaking interoperability. At the same time,=20 >attacks on RC4 are improving (e.g. >http://www.isg.rhul.ac.uk/tls/), to the point that practical exploits=20 >are possible. >=20 >I have posted a new Internet-Draft =B3Prohibiting RC4 Cipher Suites=B2 >(draft-popov-tls-prohibiting-rc4-00 >) to=20 >deprecate the use of RC4 cipher suites in TLS. >=20 >Looking forward to comments and feedback on the draft, >=20 >Andrei Popov > From martin.thomson@gmail.com Thu Aug 22 15:33:33 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1421311E81F8 for ; Thu, 22 Aug 2013 15:33:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.606 X-Spam-Level: X-Spam-Status: No, score=-2.606 tagged_above=-999 required=5 tests=[AWL=-0.006, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x0yneiu6t2Xo for ; Thu, 22 Aug 2013 15:33:32 -0700 (PDT) Received: from mail-we0-x229.google.com (mail-we0-x229.google.com [IPv6:2a00:1450:400c:c03::229]) by ietfa.amsl.com (Postfix) with ESMTP id 5683F11E81C7 for ; Thu, 22 Aug 2013 15:33:32 -0700 (PDT) Received: by mail-we0-f169.google.com with SMTP id t61so2302611wes.28 for ; Thu, 22 Aug 2013 15:33:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=nEl5tSR1TT2KH69vS0AeEPU1JDbwJuFpAXk239UwqWE=; b=TmVvNs4dwDq89Xje61uE8jd4gHPi2paz46UQSFt+X2bXu25NE1mrDzlV+AKl60MuDG uWJu9hD81nx5y54wAoaUpKm/q7M7xcKOJ3KRvUJvgEnwRQddsvP8MHFrHahYvt8Is++p oRpSDeoGmTTRFvuUJxT45iRR0FKgz+oW1ZVxU5gesQVEuufLfDFuNaWFjzRfBEbDcbzi vW9m6tK1kLkH4sT6bAvAvegSTkzDnubw0bGebEnbxyoWLKPcRydP2p1d52e0DfPcvAA3 tm3ENY7tsDK2WJwlNL1F3CYqACapxq9v37eFOktsiVhePWIGA8J++OZPsMMbM6UIwNwI 2QmQ== MIME-Version: 1.0 X-Received: by 10.194.240.197 with SMTP id wc5mr12677785wjc.23.1377210811358; Thu, 22 Aug 2013 15:33:31 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Thu, 22 Aug 2013 15:33:31 -0700 (PDT) In-Reply-To: <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C13EC7C62@xmb-aln-x02.cisco.com> References: <3651ef9088a147dd8e8d887f769a9538@BL2PR03MB194.namprd03.prod.outlook.com> <48F1B141-16C5-448E-887F-6D91E7535A2D@checkpoint.com> <42699D1B-62E4-4E90-BF35-2C56A7520403@checkpoint.com> <073b3285216c4e7b8879cd9cefc4c423@BL2PR03MB194.namprd03.prod.outlook.com> <383DCBA8-194B-461B-BB8D-45CC501DEDD8@checkpoint.com> <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C13EC7C62@xmb-aln-x02.cisco.com> Date: Thu, 22 Aug 2013 15:33:31 -0700 Message-ID: From: Martin Thomson To: "Stephan Friedl (sfriedl)" Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Cc: "tls@ietf.org" Subject: Re: [TLS] WGLC comments on draft-ietf-tls-applayerprotoneg-01 X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Aug 2013 22:33:33 -0000 On 22 August 2013 14:19, Stephan Friedl (sfriedl) wrote= : > 1. We will fix the typos. > 2. We will remove the HTTP/2.0 registration. Martin can add the reg= istration to the IANA Considerations section of the HTTP/2.0 draft. > 3. We will leave the lower-case HTTP/1.1 protocol ID as it is. Sounds good. Thanks. > I'd suggest that we leave the 'exp' namespace in the draft and add a stat= ement urging anyone choosing to avail themselves of an 'exp' prefixed opaqu= e protocol identifier to review RFC6648 and make sure they are doing the ri= ght thing. The 'exp' namespace has been explicitly requested by a number o= f TLS working group members, so I'm hesitant to remove it without more voic= es calling out for its removal. I don't think that your analysis places sufficient weight on the cost of changing names. The experience that lead to the publication of 6648 shows that renaming doesn't happen in practice. In this case, there is also a size pressure that prevents the use of multiple names for the same thing. The key problem with X- or exp is that both carry zero semantics, but they tend to create name-ghettos as a result of implementations that explicitly ignore names with these prefixes. Keeping 'exp' would be choosing the preferences of a small few over IETF consensus on this matter. From Andrei.Popov@microsoft.com Thu Aug 22 16:54:24 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E6FB11E827F for ; Thu, 22 Aug 2013 16:54:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.099 X-Spam-Level: X-Spam-Status: No, score=-4.099 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RNiUSuQ-KbHv for ; Thu, 22 Aug 2013 16:54:20 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0212.outbound.protection.outlook.com [207.46.163.212]) by ietfa.amsl.com (Postfix) with ESMTP id B433711E827B for ; Thu, 22 Aug 2013 16:54:19 -0700 (PDT) Received: from BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) by BL2PR03MB195.namprd03.prod.outlook.com (10.255.230.153) with Microsoft SMTP Server (TLS) id 15.0.745.25; Thu, 22 Aug 2013 23:24:06 +0000 Received: from BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.159]) by BL2PR03MB194.namprd03.prod.outlook.com ([169.254.14.218]) with mapi id 15.00.0745.000; Thu, 22 Aug 2013 23:24:05 +0000 From: Andrei Popov To: Yaron Sheffer , "tls@ietf.org" Thread-Topic: [TLS] Prohibiting RC4 Cipher Suites Thread-Index: AQHOnwo/26xymWMV+kOMJzEU3b3OB5mh0iXQ Date: Thu, 22 Aug 2013 23:24:05 +0000 Message-ID: <33d9189a96054eb8b239102453d92c5b@BL2PR03MB194.namprd03.prod.outlook.com> References: <5215BF4A.7020909@gmail.com> In-Reply-To: <5215BF4A.7020909@gmail.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [2001:4898:80e0:ed43::3] x-forefront-prvs: 0946DC87A1 x-forefront-antispam-report: SFV:NSPM; SFS:(164054003)(13464003)(51914003)(377454003)(199002)(189002)(69226001)(56776001)(74876001)(74316001)(31966008)(81542001)(4396001)(77096001)(54316002)(76482001)(74502001)(74662001)(54356001)(81342001)(74706001)(50986001)(47736001)(56816003)(47446002)(80976001)(79102001)(80022001)(65816001)(59766001)(77982001)(47976001)(74366001)(46102001)(51856001)(83072001)(76576001)(63696002)(53806001)(49866001)(76796001)(19580405001)(83322001)(19580395003)(33646001)(76786001)(81686001)(81816001)(3826001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BL2PR03MB195; H:BL2PR03MB194.namprd03.prod.outlook.com; CLIP:2001:4898:80e0:ed43::3; RD:InfoNoRecords; A:1; MX:1; LANG:en; Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: DuplicateDomain-a84fc36a-4ed7-4e57-ab1c-3e967bcbad48.microsoft.com Subject: Re: [TLS] Prohibiting RC4 Cipher Suites X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Aug 2013 23:54:24 -0000 Hi Yaron, Thanks for the feedback. Are there any major web browsers that only support RC4? I am not aware of a= ny. =20 Arguably, the common fallback for web users is to install a different brows= er, rather than try to find a non-TLS service (which is not always an avail= able option). Cheers, Andrei -----Original Message----- From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Yaron= Sheffer Sent: Thursday, August 22, 2013 12:36 AM To: tls@ietf.org Subject: [TLS] Prohibiting RC4 Cipher Suites Hi Andrei, Thank you for the new draft. While I agree with the motivation and with the= first two recommendations (do not offer RC4, do not accept RC4 - if possible!) I disagree that it is better to completely reject a client that = offers only RC4, because the intuitive fallback for Web users is simply, do= n't do TLS. In a world of pervasive passive surveillance (see https://www.i= etf.org/mailman/listinfo/perpass), we would prefer sessions to be encrypted= even if it means that an active attacker, working hard, can break into the= m. And yes, the is the age old "false sense of security" discussion, yet ag= ain. Thanks, Yaron _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls From yaronf.ietf@gmail.com Fri Aug 23 03:33:09 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9880721F9E67 for ; Fri, 23 Aug 2013 03:33:09 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.453 X-Spam-Level: X-Spam-Status: No, score=-102.453 tagged_above=-999 required=5 tests=[AWL=0.146, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Th+h+Sy-QtEP for ; Fri, 23 Aug 2013 03:33:08 -0700 (PDT) Received: from mail-ee0-x235.google.com (mail-ee0-x235.google.com [IPv6:2a00:1450:4013:c00::235]) by ietfa.amsl.com (Postfix) with ESMTP id B5EE521F9A99 for ; Fri, 23 Aug 2013 03:33:01 -0700 (PDT) Received: by mail-ee0-f53.google.com with SMTP id b15so213033eek.12 for ; Fri, 23 Aug 2013 03:33:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=6QUbR1q2Us7Os8j89x7snIw4AG7E1vFHb1A1DIx3LnM=; b=zHEyXDwCsywPh8KQRSwI0z87VpUr2fSPaTXi27XlWiWXypqVpGGZjyQysWqF2oBd7b Q4g8HTIcZ0yaTlv2lf/8I1woFEr0+BBCJwoD5hi2jfPk5GMLtbogCp0M0Mz7mue9kxb9 SbUmgldtlIXz5MD/41u8TuiYN5WYlPNB0RVrmaxaNpfDhOTFH1xRpkAiUpQSi97svCfw xXH+EWct+uqazpvO0ayUGI3R/84fAnuozsqUTtkZ/63RHUL8D0wkLtXjBQmKwcN0Hn8h qGVZIgj8lvmCvse3LH9SpIxzPex27Ibq4mTVEaPzqBj3XLDudM28+DWOgNEMSfY7525L +Thg== X-Received: by 10.14.184.3 with SMTP id r3mr25636226eem.49.1377253980852; Fri, 23 Aug 2013 03:33:00 -0700 (PDT) Received: from [10.0.0.6] (bzq-79-181-211-116.red.bezeqint.net. [79.181.211.116]) by mx.google.com with ESMTPSA id r48sm23813526eev.14.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 23 Aug 2013 03:33:00 -0700 (PDT) Message-ID: <52173A5A.5000302@gmail.com> Date: Fri, 23 Aug 2013 13:32:58 +0300 From: Yaron Sheffer User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130804 Thunderbird/17.0.8 MIME-Version: 1.0 To: Andrei Popov References: <5215BF4A.7020909@gmail.com> <33d9189a96054eb8b239102453d92c5b@BL2PR03MB194.namprd03.prod.outlook.com> In-Reply-To: <33d9189a96054eb8b239102453d92c5b@BL2PR03MB194.namprd03.prod.outlook.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: "tls@ietf.org" Subject: Re: [TLS] Prohibiting RC4 Cipher Suites X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Aug 2013 10:33:09 -0000 Hi Andrei, Of course current Web browsers all support better ciphersuites. But there is huge diversity here: people may have very old browsers and are not allowed or cannot install newer versions. Or people may be using old kiosks that are totally out of their control. Or admins may have set up a silly group policy and users are stuck with it. And in general, many people (most people?) will do what comes easier rather than what makes sense from a security point of view. We should maximize the security of users, even if they're acting stupidly. Thanks, Yaron On 2013-08-23 02:24, Andrei Popov wrote: > Hi Yaron, > > Thanks for the feedback. > > Are there any major web browsers that only support RC4? I am not aware of any. > > Arguably, the common fallback for web users is to install a different browser, rather than try to find a non-TLS service (which is not always an available option). > > Cheers, > > Andrei > > -----Original Message----- > From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Yaron Sheffer > Sent: Thursday, August 22, 2013 12:36 AM > To: tls@ietf.org > Subject: [TLS] Prohibiting RC4 Cipher Suites > > Hi Andrei, > > Thank you for the new draft. While I agree with the motivation and with the first two recommendations (do not offer RC4, do not accept RC4 - if > possible!) I disagree that it is better to completely reject a client that offers only RC4, because the intuitive fallback for Web users is simply, don't do TLS. In a world of pervasive passive surveillance (see https://www.ietf.org/mailman/listinfo/perpass), we would prefer sessions to be encrypted even if it means that an active attacker, working hard, can break into them. And yes, the is the age old "false sense of security" discussion, yet again. > > Thanks, > Yaron > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls > From martin.thomson@gmail.com Mon Aug 26 12:55:13 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 094BC21F9D96 for ; Mon, 26 Aug 2013 12:55:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.606 X-Spam-Level: X-Spam-Status: No, score=-2.606 tagged_above=-999 required=5 tests=[AWL=-0.006, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kOD+bC7VxNhi for ; Mon, 26 Aug 2013 12:55:12 -0700 (PDT) Received: from mail-wi0-x22f.google.com (mail-wi0-x22f.google.com [IPv6:2a00:1450:400c:c05::22f]) by ietfa.amsl.com (Postfix) with ESMTP id E139221F9D70 for ; Mon, 26 Aug 2013 12:55:11 -0700 (PDT) Received: by mail-wi0-f175.google.com with SMTP id cb5so2159095wib.2 for ; Mon, 26 Aug 2013 12:55:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=EkwkXVLTxtnEvxiwT34NcrkBOPV6XKpoX4X0ZtGtaNI=; b=dB5jt57N60Gf0HUB2BQIchZ36nlu3uxPh7umP94bpxIipm34XWx9tDCmB/gG6vt4XV v0G04qTxdKhqpN6Wh/maQi45HcDDRqJ6LDZhj5WEdZdCaYe+vfCX9mxC1eGbOrOiIQjt 8ux7qXNrEHhPMKDJv5r/bnU1tt2de4WKJuXkEdpWw10ZXSp9IB0hocpfxeWhmAFnTZiW 9PUbknzBVhUk7t3snAhYVSF0Ricd9vbVwO4ewyH5yzmtk/wqXP2vgYBGuYuvofffv4jc IrskDZqvImEVl3oui+WF0BnVjU7UBapgxBjXcJCP+ZIU1ZM/9iRQQUukjvOgOHbQwoX/ Ms3Q== MIME-Version: 1.0 X-Received: by 10.180.109.10 with SMTP id ho10mr8649184wib.14.1377546908867; Mon, 26 Aug 2013 12:55:08 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Mon, 26 Aug 2013 12:55:08 -0700 (PDT) Date: Mon, 26 Aug 2013 12:55:08 -0700 Message-ID: From: Martin Thomson To: "tls@ietf.org" Content-Type: text/plain; charset=UTF-8 Subject: [TLS] Registry for ALPN X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 19:55:13 -0000 draft-ietf-tls-applayerprotoneg-01 describes a registry for new strings, but it does not describe what rules that registry operates under, nor does it describe what information a registration is expected to contain. I'm going to suggest that "Expert Review" [RFC5226] is sufficient for this registry. Here's what I propose the document describe. OLD: This document also requires the IANA to create a registry of Application Layer Protocol Negotiation protocol byte strings, initially containing the following entries: [... registrations ...] We propose that this new registry be created in a new page entitled: "Application Layer Protocol Negotiation (ALPN) Protocol IDs" beneath the existing heading of "Transport Layer Security (TLS)". NEW: This document establishes a registry for protocol identifiers entitled "Application Layer Protocol Negotiation (ALPN) Protocol IDs" under the existing "Transport Layer Security (TLS)" heading. Entries in this registry require the following fields: Protocol: The name of the protocol. Identification Sequence: The precise set of octet values that identifies the protocol. This could be the UTF-8 encoding [RFC3269] of the protocol name. Specification: A reference to a specification that defines the protocol. This registry operates under the "Expert Review" policy as defined in [RFC5226]. The designated expert is advised to encourage the inclusion of a reference to a permanent and readily available specification that enables the creation of interoperable implementations of the identified protocol. An initial set of registrations for this registry follow: Protocol: HTTP/1.1 Identification Sequence: 0x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1") Specification: RFC 2616 Protocol: SPDY/1 Identification Sequence: 0x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1") Specification: http://dev.chromium.org/spdy/spdy-protocol/spdy-protocol-draft1 etc... From sfriedl@cisco.com Mon Aug 26 13:08:30 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71B8921F9D2E for ; Mon, 26 Aug 2013 13:08:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.599 X-Spam-Level: X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FPTZ5cns9z2g for ; Mon, 26 Aug 2013 13:08:24 -0700 (PDT) Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id 7C84D21F99C7 for ; Mon, 26 Aug 2013 13:08:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3414; q=dns/txt; s=iport; t=1377547704; x=1378757304; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=ZsGUrhcKrawVa97hv1FMp4SarZOhTgDsdjmwo3jenPc=; b=Av3iTQ4Cr0xxSBZZxL8ULykZy2gNEfmiOwmM1/ZBclh/zv6osZFyTASN bj2afB5fHEb25QbIR2S8fKVKF7ulOEyiluGWKJxCK5gYQgiNS8tn5QAq1 BwOOntJjxmfIwN42H7d/K2ROQ4+xBbZISuQ38lEpywHiphH14HLv5IuFx k=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AhwFADa1G1KtJV2d/2dsb2JhbABagwc1UcAigSIWdIIkAQEBBAEBATcxAwsMBAIBCBEEAQELFAkHJwsUCQgCBA4FCId5DLd+kEcxBwaDFn0DqU+DHoIq X-IronPort-AV: E=Sophos;i="4.89,961,1367971200"; d="scan'208";a="251830054" Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-7.cisco.com with ESMTP; 26 Aug 2013 20:08:23 +0000 Received: from xhc-aln-x03.cisco.com (xhc-aln-x03.cisco.com [173.36.12.77]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id r7QK8NlO015161 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 26 Aug 2013 20:08:23 GMT Received: from xmb-aln-x02.cisco.com ([169.254.5.15]) by xhc-aln-x03.cisco.com ([173.36.12.77]) with mapi id 14.02.0318.004; Mon, 26 Aug 2013 15:08:23 -0500 From: "Stephan Friedl (sfriedl)" To: Martin Thomson Thread-Topic: [TLS] Registry for ALPN Thread-Index: AQHOopYwrHclIVAh3kKnop0XRFyxGpmn59hg Date: Mon, 26 Aug 2013 20:08:22 +0000 Message-ID: <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C15BDE208@xmb-aln-x02.cisco.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.94.178.43] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] Registry for ALPN X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 20:08:30 -0000 Martin, Did you intend to have 'http/1.1" as the identification sequence for spdy, = or is that a typo? Off the cuff, the changes look very reasonable, certainly much more precise= than the current wording. I'm not familiar enough with RFC5526 to have an= opinion on that right now, I'll read the RFC for implications - though I'd= expect review will be a good thing. With regard to the 'exp' prefix for experimental protocols, as nobody else = responded that they really wanted the prefix any longer, I'd suggest that w= e drop the 'exp' prefix and replace the sentence calling out the experiment= al namespace with a statement directing protocol developers to reference RF= C6648 in the event they feel the need for an 'experimental or private' prot= ocol identifier. Even RFC6648 recognizes that occasionally there will be s= uch a need and has some suggestions on forming such identifiers. Does that sound reasonable? Thanks, Stephan -----Original Message----- From: tls-bounces@ietf.org [mailto:tls-bounces@ietf.org] On Behalf Of Marti= n Thomson Sent: Monday, August 26, 2013 1:55 PM To: tls@ietf.org Subject: [TLS] Registry for ALPN draft-ietf-tls-applayerprotoneg-01 describes a registry for new strings, bu= t it does not describe what rules that registry operates under, nor does it= describe what information a registration is expected to contain. I'm going to suggest that "Expert Review" [RFC5226] is sufficient for this = registry. Here's what I propose the document describe. OLD: This document also requires the IANA to create a registry of Application Layer Protocol Negotiation protocol byte strings, initially containing the following entries: [... registrations ...] We propose that this new registry be created in a new page entitled: "Application Layer Protocol Negotiation (ALPN) Protocol IDs" beneath the existing heading of "Transport Layer Security (TLS)". NEW: This document establishes a registry for protocol identifiers entitled "Application Layer Protocol Negotiation (ALPN) Protocol IDs" under the existing "Transport Layer Security (TLS)" heading. Entries in this registry require the following fields: Protocol: The name of the protocol. Identification Sequence: The precise set of octet values that identifie= s the protocol. This could be the UTF-8 encoding [RFC3269] of the protocol name. Specification: A reference to a specification that defines the protocol= . This registry operates under the "Expert Review" policy as defined in [RFC5226]. The designated expert is advised to encourage the inclusion of a reference to a permanent and readily available specification that enables the creation of interoperable implementations of the identified protocol. An initial set of registrations for this registry follow: Protocol: HTTP/1.1 Identification Sequence: 0x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1") Specification: RFC 2616 Protocol: SPDY/1 Identification Sequence: 0x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1") Specification: http://dev.chromium.org/spdy/spdy-protocol/spdy-protocol-draft1 etc... _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls From ynir@checkpoint.com Mon Aug 26 13:16:03 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 368D421F9E5E for ; Mon, 26 Aug 2013 13:16:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.651 X-Spam-Level: X-Spam-Status: No, score=-10.651 tagged_above=-999 required=5 tests=[AWL=-0.052, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XtipDgmAGtE2 for ; Mon, 26 Aug 2013 13:15:58 -0700 (PDT) Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 8F15921F9E39 for ; Mon, 26 Aug 2013 13:15:57 -0700 (PDT) Received: from IL-EX10.ad.checkpoint.com ([194.29.34.147]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r7QKFT1i011620; Mon, 26 Aug 2013 23:15:30 +0300 X-CheckPoint: {521BB761-10-1B221DC2-1FFFF} Received: from DAG-EX10.ad.checkpoint.com ([169.254.3.173]) by IL-EX10.ad.checkpoint.com ([169.254.2.124]) with mapi id 14.02.0347.000; Mon, 26 Aug 2013 23:15:30 +0300 From: Yoav Nir To: Martin Thomson Thread-Topic: [TLS] Registry for ALPN Thread-Index: AQHOopY2hnhrfeOon0eP6uPxKZawJZmnupaA Date: Mon, 26 Aug 2013 20:15:28 +0000 Message-ID: <64BA577B-0090-4986-82B2-DD89B7F1176C@checkpoint.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.31.20.149] x-kse-antivirus-interceptor-info: protection disabled x-cpdlp: 1160a2977f241ea6add4c3da0fef295ab6a54c84e0 Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "tls@ietf.org" Subject: Re: [TLS] Registry for ALPN X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 20:16:03 -0000 Hi Martin Any reason for "expert review" rather than "first come first serve"?=20 What meaningful input can a designated expert have on someone asking for a = string for their proprietary protocol? Yoav On Aug 26, 2013, at 10:55 PM, Martin Thomson wro= te: > draft-ietf-tls-applayerprotoneg-01 describes a registry for new > strings, but it does not describe what rules that registry operates > under, nor does it describe what information a registration is > expected to contain. >=20 > I'm going to suggest that "Expert Review" [RFC5226] is sufficient for > this registry. Here's what I propose the document describe. >=20 > OLD: > This document also requires the IANA to create a registry of > Application Layer Protocol Negotiation protocol byte strings, > initially containing the following entries: >=20 > [... registrations ...] >=20 > We propose that this new registry be created in a new page entitled: > "Application Layer Protocol Negotiation (ALPN) Protocol IDs" beneath > the existing heading of "Transport Layer Security (TLS)". >=20 > NEW: > This document establishes a registry for protocol identifiers entitled > "Application Layer Protocol Negotiation (ALPN) Protocol IDs" under the > existing "Transport Layer Security (TLS)" heading. >=20 > Entries in this registry require the following fields: >=20 > Protocol: The name of the protocol. > Identification Sequence: The precise set of octet values that identifi= es > the protocol. This could be the UTF-8 encoding [RFC3269] of the > protocol name. > Specification: A reference to a specification that defines the protoco= l. >=20 > This registry operates under the "Expert Review" policy as defined > in [RFC5226]. The designated expert is advised to encourage the > inclusion of a reference to a permanent and readily available > specification that enables the creation of interoperable > implementations of the identified protocol. >=20 > An initial set of registrations for this registry follow: >=20 > Protocol: HTTP/1.1 > Identification Sequence: > 0x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1") > Specification: RFC 2616 >=20 > Protocol: SPDY/1 > Identification Sequence: > 0x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1") > Specification: > http://dev.chromium.org/spdy/spdy-protocol/spdy-protocol-draft1 >=20 > etc... > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls From paul.hoffman@vpnc.org Mon Aug 26 13:56:56 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 255B721F9F26 for ; Mon, 26 Aug 2013 13:56:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.574 X-Spam-Level: X-Spam-Status: No, score=-102.574 tagged_above=-999 required=5 tests=[AWL=0.025, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jD74WF2aKBk9 for ; Mon, 26 Aug 2013 13:56:55 -0700 (PDT) Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 5D3F911E8230 for ; Mon, 26 Aug 2013 13:56:55 -0700 (PDT) Received: from [165.227.249.247] (sn80.proper.com [75.101.18.80]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.5) with ESMTP id r7QKunYp065585 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 26 Aug 2013 13:56:50 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) X-Authentication-Warning: hoffman.proper.com: Host sn80.proper.com [75.101.18.80] claimed to be [165.227.249.247] Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Paul Hoffman In-Reply-To: Date: Mon, 26 Aug 2013 13:56:48 -0700 Content-Transfer-Encoding: quoted-printable Message-Id: References: To: "tls@ietf.org" X-Mailer: Apple Mail (2.1508) Subject: Re: [TLS] Registry for ALPN X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 20:56:56 -0000 On Aug 26, 2013, at 12:55 PM, Martin Thomson = wrote: > I'm going to suggest that "Expert Review" [RFC5226] is sufficient for > this registry. Here's what I propose the document describe. +1. And +1 to Martin's specific text changes. On Aug 26, 2013, at 1:15 PM, Yoav Nir wrote: > Any reason for "expert review" rather than "first come first serve"?=20= >=20 > What meaningful input can a designated expert have on someone asking = for a string for their proprietary protocol? In the past, we have seen individuals *not* associated with a particular = protocol try to register strings in IANA and do harm. For example, they = might register a string that is similar to, but different from, the = string used in the code that people were running. Another is that = someone might try to squat on strings that would otherwise be useful. An expert reviewer can often see problems like this and prevent them = from happening. --Paul Hoffman= From martin.thomson@gmail.com Mon Aug 26 15:38:40 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBBF611E80F5 for ; Mon, 26 Aug 2013 15:38:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.606 X-Spam-Level: X-Spam-Status: No, score=-2.606 tagged_above=-999 required=5 tests=[AWL=-0.006, BAYES_00=-2.599, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DrWOXEjSNQ5J for ; Mon, 26 Aug 2013 15:38:40 -0700 (PDT) Received: from mail-we0-x233.google.com (mail-we0-x233.google.com [IPv6:2a00:1450:400c:c03::233]) by ietfa.amsl.com (Postfix) with ESMTP id EA94B11E80E4 for ; Mon, 26 Aug 2013 15:38:39 -0700 (PDT) Received: by mail-we0-f179.google.com with SMTP id t58so3319449wes.10 for ; Mon, 26 Aug 2013 15:38:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=JCr4XfUz81jK00oXeLz/fjpeNigSQJWiFC1BGanPdis=; b=C9dtRditHNi4T+WRsG+bFmDh0b8m66r/q4wl2xIZH36gJwqhTZRdlpocXfV4BU3ZSd ej2+HJJP3v3Iz+d0mxcQCukhfMPFvwRdpT/87cnnuMBbTLXmdqLCrsWXSudPl4n5lb1b Ui3RJt0Jg0tXHbDM0iilhggzmkoWo4ysNC9ini2yKE0i9cO50vsZpEVArnW+lBWMepqm 84UhPppwTwOpdPvb+FejshoBZeDVs/rSqPN5HP0n3/bwrWJQZxCx+Wp/QLphfilIL7uw qQ11zm0lswDKNSiORactgzgs5Iz6m/ix4hm0voHrO4J0QMHZHGjMpVEJA54hRjnjN6mr 5evg== MIME-Version: 1.0 X-Received: by 10.180.212.51 with SMTP id nh19mr9183298wic.14.1377556719106; Mon, 26 Aug 2013 15:38:39 -0700 (PDT) Received: by 10.194.28.39 with HTTP; Mon, 26 Aug 2013 15:38:39 -0700 (PDT) In-Reply-To: <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C15BDE208@xmb-aln-x02.cisco.com> References: <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C15BDE208@xmb-aln-x02.cisco.com> Date: Mon, 26 Aug 2013 15:38:39 -0700 Message-ID: From: Martin Thomson To: "Stephan Friedl (sfriedl)" Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Cc: "tls@ietf.org" Subject: Re: [TLS] Registry for ALPN X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 22:38:40 -0000 On 26 August 2013 13:08, Stephan Friedl (sfriedl) wrote= : > I'd suggest that we drop the 'exp' prefix and replace the sentence callin= g out the experimental namespace with a statement directing protocol develo= pers to reference RFC6648 in the event they feel the need for an 'experimen= tal or private' protocol identifier. In practice, what people do is very simple. They make up a new string and start using it. Then, sometimes, they get around to telling IANA about it. It sounds kinda bad, but it does tend to work out. I can't see a way to add text to that effect that wouldn't also invite confusion. From stpeter@stpeter.im Mon Aug 26 15:47:12 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8BB811E80F8 for ; Mon, 26 Aug 2013 15:47:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.376 X-Spam-Level: X-Spam-Status: No, score=-102.376 tagged_above=-999 required=5 tests=[AWL=0.223, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x4Lz9JvHLEWZ for ; Mon, 26 Aug 2013 15:47:08 -0700 (PDT) Received: from stpeter.im (mailhost.stpeter.im [207.210.219.225]) by ietfa.amsl.com (Postfix) with ESMTP id E995311E80F7 for ; Mon, 26 Aug 2013 15:47:07 -0700 (PDT) Received: from sjc-vpn7-819.cisco.com (unknown [128.107.239.235]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 5304B414D4; Mon, 26 Aug 2013 16:50:39 -0600 (MDT) Message-ID: <521BDAE3.6090304@stpeter.im> Date: Mon, 26 Aug 2013 16:46:59 -0600 From: Peter Saint-Andre User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Martin Thomson References: <2AA4F2B7B0341A4CA4DAB10D4EDA0D7C15BDE208@xmb-aln-x02.cisco.com> In-Reply-To: X-Enigmail-Version: 1.5.2 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: "tls@ietf.org" Subject: Re: [TLS] Registry for ALPN X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 22:47:12 -0000 On 8/26/13 4:38 PM, Martin Thomson wrote: > On 26 August 2013 13:08, Stephan Friedl (sfriedl) wrote: >> I'd suggest that we drop the 'exp' prefix and replace the sentence calling out the experimental namespace with a statement directing protocol developers to reference RFC6648 in the event they feel the need for an 'experimental or private' protocol identifier. > > In practice, what people do is very simple. They make up a new string > and start using it. Then, sometimes, they get around to telling IANA > about it. It sounds kinda bad, but it does tend to work out. > > I can't see a way to add text to that effect that wouldn't also invite > confusion. Tell people to mint their own names. RFC 6648 suggests ways to do that. There's no need for yet another form of "X-". http://tools.ietf.org/html/rfc6648 Peter -- Peter Saint-Andre https://stpeter.im/ From alexey.melnikov@isode.com Tue Aug 27 05:37:23 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B879311E813A for ; Tue, 27 Aug 2013 05:37:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.922 X-Spam-Level: X-Spam-Status: No, score=-102.922 tagged_above=-999 required=5 tests=[AWL=-0.323, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r6tjNBfhxIZM for ; Tue, 27 Aug 2013 05:37:19 -0700 (PDT) Received: from statler.isode.com (statler.isode.com [62.3.217.254]) by ietfa.amsl.com (Postfix) with ESMTP id 350D621F9A1F for ; Tue, 27 Aug 2013 05:37:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1377607025; d=isode.com; s=selector; i=@isode.com; bh=xw1f1rhAVYV2rhKDIAcWNxFiKsP6kbX6BnGC3iHJwPE=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=xlvlxj/SPa40A2raG9OIIgFuQgz/aMssdi/a/Q3JfTIsfhf/ItYrEbGpBNqHZwntu4EtI9 M33TRW1T3U8fnVw6ilOoEnOom9NSeNXMiP8rh4mg7lLPEtmId6+hoHuXEuLPR9KR0ajYL3 tdNubPsQDa8E9VU2BCpD8y1Ss8yTtek=; Received: from [172.16.1.29] (shiny.isode.com [62.3.217.250]) by statler.isode.com (submission channel) via TCP with ESMTPA id ; Tue, 27 Aug 2013 13:37:04 +0100 Message-ID: <521C9D70.3080507@isode.com> Date: Tue, 27 Aug 2013 13:37:04 +0100 From: Alexey Melnikov User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 To: "Joseph Salowey (jsalowey)" References: In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: "" Subject: Re: [TLS] Start of Working Group Last Call for ALPN (draft-ietf-tls-applayerprotoneg-01) X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2013 12:37:23 -0000 On 15/08/2013 23:27, Joseph Salowey (jsalowey) wrote: > This is the working group last call for draft-ietf-tls-applayerprotoneg-01. Please send your reviews and comments to the TLS list by September 6, 2013. > > The draft can be found at http://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-01 I read the document and it looks to be well written and useful. I don't have any concerns other than the IANA registration procedure already discussed on the mailing list. One minor thing that would have helped me with understanding the document: I think it is worth mentioning multiplexing on a single port earlier in the document. From mcgrew@cisco.com Tue Aug 27 14:20:56 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEC2E11E81FA for ; Tue, 27 Aug 2013 14:20:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -110.599 X-Spam-Level: X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q9pHbFfRL2R3 for ; Tue, 27 Aug 2013 14:20:51 -0700 (PDT) Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) by ietfa.amsl.com (Postfix) with ESMTP id 7B3D911E81D6 for ; Tue, 27 Aug 2013 14:20:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2405; q=dns/txt; s=iport; t=1377638451; x=1378848051; h=message-id:subject:from:to:cc:date:in-reply-to: references:mime-version:content-transfer-encoding; bh=yK3cjvLQN4/f4l0RmPkz5M0h3vJ5tDT0kKjoEeiwNxs=; b=FSziX4pBRRxon1SEkgSQwOvXUmwGtf+sNTJbEby9A9bVqEE/jRIQMu86 9u/nSY57PI88aghQC430Gkbiap2HlloWEDSeREU36ILUryjtCvi1UGg2A /ia3WaUsAdNZLZEaE9Hud+VVA6CwE8OHQis4xm5Szx1TRIitcMIAEXI3N A=; X-IronPort-AV: E=Sophos;i="4.89,970,1367971200"; d="scan'208";a="252378167" Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-6.cisco.com with ESMTP; 27 Aug 2013 21:20:51 +0000 Received: from [10.0.2.15] (rtp-mcgrew-8912.cisco.com [10.117.10.227]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id r7RLKo3u031236; Tue, 27 Aug 2013 21:20:50 GMT Message-ID: <1377638449.4027.222.camel@darkstar> From: David McGrew To: Wan-Teh Chang Date: Tue, 27 Aug 2013 17:20:49 -0400 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4-3 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Cc: foleyj@cisco.com, "tls@ietf.org" , Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2013 21:20:56 -0000 Hi Wan-Teh, thanks to you and Ryan for identifying and raising this issue, more inline: On Wed, 2013-08-21 at 10:49 -0700, Wan-Teh Chang wrote: > While reviewing the NSS patch for the AES-GCM TLS cipher suites, my > colleague Ryan Sleevi noticed that the AEAD algorithms defined in > draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD > ciphers. The problem is how TLS 1.2 specifies the additional > authenticated data for AEAD ciphers: > > RFC 5246 Section 6.2.3.3 says: > > The plaintext is the TLSCompressed.fragment. > > The additional authenticated data, which we denote as > additional_data, is defined as follows: > > additional_data = seq_num + TLSCompressed.type + > TLSCompressed.version + TLSCompressed.length; > > where "+" denotes concatenation. > > So additional_data includes the length of the plaintext > (TLSCompressed.length). But a TLS 1.2 record only gives us the length > of the AEAD ciphertext. So the recipient needs to calculate the > plaintext's length using only the ciphertext. > > This is difficult to do with the AEAD algorithms in > draft-mcgrew-aead-aes-cbc-hmac-sha2 because the amount of padding, and > therefore the plaintext length, is only known after CBC decryption. Yes, this is true. Given the CBC decryption key, it is not hard to find the length of the plaintext (and the final block can be decrypted as P_n = AES-DEC(K, C_n) XOR C_{n-1} without decrypting any other blocks, if that is desired). But it would be undesirable to use this technique, since we want the key to "stay inside" the AEAD algorithm. RFC 5116 asks that each algorithm "provide a description relating the length of the plaintext to that of the ciphertext." What you have found is that draft-mcgrew-aead-aes-cbc-hmac-sha2 provides a relationship for finding the ciphertext length from the plaintext length, but not the reverse, and it is impossible to find that reverse relationship without the secret key. All of the AEAD algorithms in the registry (which are based on CCM, GCM, and SIV) use counter-mode style encryption, and don't have this problem. I have some thoughts on changes that can improve the situation, which I'll send in reply to John's email. thanks, David > > Is this a known problem with TLS 1.2 AEAD ciphers? > > Wan-Teh Chang From mcgrew@cisco.com Tue Aug 27 14:27:09 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A520C11E8303 for ; Tue, 27 Aug 2013 14:27:09 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -110.599 X-Spam-Level: X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KSWnjW90tafV for ; Tue, 27 Aug 2013 14:27:05 -0700 (PDT) Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) by ietfa.amsl.com (Postfix) with ESMTP id DCA3D11E8258 for ; Tue, 27 Aug 2013 14:27:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2903; q=dns/txt; s=iport; t=1377638824; x=1378848424; h=message-id:subject:from:to:cc:date:in-reply-to: references:mime-version:content-transfer-encoding; bh=lxIHWKcobT1IQGl1+mDpTbANrUBBm1sA43lAoZyRnGQ=; b=iPVsXDpZOvdc+W+HkUlNrvUwQW/1kfVKshkDwhEaKCKyzk9IaXoktOZe pSny1Srk0Hl6OeYnhQLKeQpyfewG4y8limZHxyMYIm/hobqT2Va020J3r o2EE4opQ2qqUgyHiatiTyKAYqrL/FdpyEz8JysTZv67+U2TgMAnioIhIQ M=; X-IronPort-AV: E=Sophos;i="4.89,970,1367971200"; d="scan'208";a="252380123" Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-6.cisco.com with ESMTP; 27 Aug 2013 21:27:03 +0000 Received: from [10.0.2.15] (rtp-mcgrew-8912.cisco.com [10.117.10.227]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id r7RLR2E2028020; Tue, 27 Aug 2013 21:27:03 GMT Message-ID: <1377638822.4027.228.camel@darkstar> From: David McGrew To: John Foley Date: Tue, 27 Aug 2013 17:27:02 -0400 In-Reply-To: <5215102B.30200@cisco.com> References: <5215102B.30200@cisco.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4-3 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Cc: "tls@ietf.org" , Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2013 21:27:09 -0000 Hi John, On Wed, 2013-08-21 at 15:08 -0400, John Foley wrote: > Agreed, RFC 5246 section 6.2.3.3 is written for AEAD ciphers that grow > the payload by a fixed length. [draft-mcgrew-aead-aes-cbc-hmac-sha2] > grows the payload by a variable length because CBC mode is used. The > only way to use this with TLS 1.2 would be to violate the spec by > increasing the TLSCompressed.length by the pad value prior to > encrypting. Then when decrypting we would have the appropriate value > for the additional data input. > > It seems that [draft-mcgrew-aead-aes-cbc-hmac-sha2] needs to include a > section to revise RFC 5246, or another draft is required that revises > 5246 to allow use of variable pad length AEAD ciphers. another alternative would be to define a CBC based ciphersuite that uses Cipher Text Stealing [1]. Then the plaintext and ciphertext lengths would be off by a constant, as with the other AEAD algorithms. Now, the existing padding method is used by the current draft because that method is commonly implemented in CBC libraries (it dates back to early PKCS), especially those used in JOSE. But if it is desirable, we could define a CBC algorithm that used CTS. Since some JOSE adopters have already implemented the current version of the draft, they may want to stick with the current algorithm. David P.S. - or we could stop using CBC, which is something that deserves serious discussion. [1] http://csrc.nist.gov/publications/nistpubs/800-38a/addendum-to-nist_sp800-38A.pdf > > > > > On 08/21/2013 01:49 PM, Wan-Teh Chang wrote: > > While reviewing the NSS patch for the AES-GCM TLS cipher suites, my > > colleague Ryan Sleevi noticed that the AEAD algorithms defined in > > draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD > > ciphers. The problem is how TLS 1.2 specifies the additional > > authenticated data for AEAD ciphers: > > > > RFC 5246 Section 6.2.3.3 says: > > > > The plaintext is the TLSCompressed.fragment. > > > > The additional authenticated data, which we denote as > > additional_data, is defined as follows: > > > > additional_data = seq_num + TLSCompressed.type + > > TLSCompressed.version + TLSCompressed.length; > > > > where "+" denotes concatenation. > > > > So additional_data includes the length of the plaintext > > (TLSCompressed.length). But a TLS 1.2 record only gives us the length > > of the AEAD ciphertext. So the recipient needs to calculate the > > plaintext's length using only the ciphertext. > > > > This is difficult to do with the AEAD algorithms in > > draft-mcgrew-aead-aes-cbc-hmac-sha2 because the amount of padding, and > > therefore the plaintext length, is only known after CBC decryption. > > > > Is this a known problem with TLS 1.2 AEAD ciphers? > > > > Wan-Teh Chang > > . > > > From wtc@google.com Wed Aug 28 10:48:11 2013 Return-Path: X-Original-To: tls@ietfa.amsl.com Delivered-To: tls@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3253811E81D2 for ; Wed, 28 Aug 2013 10:48:11 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.978 X-Spam-Level: X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WTcn9KuKg0E5 for ; Wed, 28 Aug 2013 10:48:10 -0700 (PDT) Received: from mail-qa0-x22d.google.com (mail-qa0-x22d.google.com [IPv6:2607:f8b0:400d:c00::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 9D05F11E81C9 for ; Wed, 28 Aug 2013 10:48:10 -0700 (PDT) Received: by mail-qa0-f45.google.com with SMTP id f11so591143qae.18 for ; Wed, 28 Aug 2013 10:48:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=56QGDDvF/34LKCBj/M9Mit5N8YQHcG62jSvSnyKOy/I=; b=BA0aDAmQTlozBbQdGqToJZUyHwjvMXxSu9oCcPKH/MPOa3YULP44cPRbtr/caO89S5 bFdkLbi4CV9m886WEFd+ulyNFzkaEewqZISAfvQepiyQsABRjVh8VY9bGX3OO/JNMTe6 RCkWXxVIHtnrBZVwia2ddKx5ORUkpIzoLoO6+D6HHrVSMzfZM0YJNSFdtlJQFsRX9JC8 36sCU34PJdrF48H0xvOtCmD1zUksoibAS8JW7TMBWKVml6VNpTZUWPM++tK1x0nrgh9O oLXe4H2dXzsOb30mpOlG9mUHxGGvZPaLbRwdhMB585yrpPiundFHbmTj2b/XSp9FMND3 31hw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=56QGDDvF/34LKCBj/M9Mit5N8YQHcG62jSvSnyKOy/I=; b=ahHT/shRfy+EG3Cq5+c8ZvhD7ZzBYS2oCHU+hhke4k11CKDEK1zQuXbGVcyukQWGJl Wx6NJ9A0G2rS45mSpeAMdT7UBB+3/X46NqW2zMHXnb1J0LE7NbVrZzUEs0BD4heXWPkW 6SGX0OEMzzAEr3XDIKS6LMaShUp2FvmOFEdz+c1RP5FAcLfPvYvEh9MYlTZmPmit1A6A j459XzMtRhDLMVwLYlN6SePY5K6w+fujDIZLTJMc0b5rxFwYimxIsdZE0wZ2WCSWj88+ ygcEnacswE+elfy9XoQcOejIH1V3xOvsngA8Ycga3bTQ/nxsl6hEFi5Hbvh3kIO5Prmc gzOg== X-Gm-Message-State: ALoCoQnpSfCbXAHObgNtm6EQjYnztrTOOJImFD9gcO1DQkbtTXgACeEZh7pNaF2EtTZx1w75/Nz1dgT9B4yFHz8eMOECgHSSkofqFWjVNz2gIaeY39sjqVLHaupODt5I6XRHu7gD0dja2jk/+W/BKKWSBqQCK6V5Xw/beAraFQ7DnZSRcbsYukxnbXDTezLGKQYJaYDXSdfT MIME-Version: 1.0 X-Received: by 10.229.51.69 with SMTP id c5mr9565753qcg.24.1377712089032; Wed, 28 Aug 2013 10:48:09 -0700 (PDT) Received: by 10.229.201.137 with HTTP; Wed, 28 Aug 2013 10:48:08 -0700 (PDT) In-Reply-To: <1377638822.4027.228.camel@darkstar> References: <5215102B.30200@cisco.com> <1377638822.4027.228.camel@darkstar> Date: Wed, 28 Aug 2013 10:48:08 -0700 Message-ID: From: Wan-Teh Chang To: David McGrew Content-Type: text/plain; charset=ISO-8859-1 Cc: John Foley , "tls@ietf.org" , Ryan Sleevi Subject: Re: [TLS] draft-mcgrew-aead-aes-cbc-hmac-sha2 can't be used as TLS 1.2 AEAD ciphers X-BeenThere: tls@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 17:48:11 -0000 Hi David, Thank you for your reply and suggestions. Re: CTS: I agree with John that adding CTS would be opposite to the reason for existence for draft-mcgrew-aead-aes-cbc-hmac-sha2 because CTS is not widely deployed. I am more interested in figuring out how TLS can use an AEAD algorithm that obscures the plaintext length. Consider the additional_data in TLS 1.2: The additional authenticated data, which we denote as additional_data, is defined as follows: additional_data = seq_num + TLSCompressed.type + TLSCompressed.version + TLSCompressed.length; The plaintext length (TLSCompressed.length) is the problematic part. Since the authentication tag of an AEAD algorithm should already cover either the plaintext length or the ciphertext length, it seems that we can safely remove TLSCompressed.version from additional_data. We can consider making this change in TLS 1.3. Wan-Teh Chang