Re: [TLS] Confirming consensus: TLS1.3->TLS*

2016-11-28 Thread Timothy Jackson
At this point, my personal opinion is to move on from TLS 1.3 to either TLS 
4/4.0 or TLS 2017.

After 15 years, everyone but us still calls it SSL. We need to admit that we 
lost the marketing battle and plan for a world where everyone calls “TLS X” 
“SSL X”. Even “new” implementations call themselves “LibreSSL” and “BoringSSL” 
rather than “LibreTLS” or “BoringTLS”.

As SSL is removed from products, we’re likely to get more and more questions 
“why am I using SSL 1.2, when I thought SSL 3 was broken?” This is a 
*legitimate* question by a user who is educated enough to know that “SSL 3 is 
bad” but has more important things to remember than the distinction between SSL 
and TLS. As others have noted, TLS 4 fixes this when users call it SSL 4, which 
they definitely will.

Tim

On 11/25/16, 6:43 AM, "TLS on behalf of Dan Brown"  wrote:

I don't oppose any of the 4 given options, but I slightly prefer TLS 2.0, 
it seems simple and clear.  

In my opinion, the whole SSL vs TLS confusion needs better education to 
confront, version numbers (even dates) alone might not be enough.  Renaming 
*SSL products to *TLS should help.  Avoiding "SSL/TLS" might help.

Since others have proposed new options, how about TLS 2.017? Using the date 
has benefits, but the actual crypto changes are much more important, so the 
decimal makes that point.  An old crypto principle is that older is better 
(among equally unbroken options) -- but naming new stuff is just not enough to 
rid us of broken old stuff, so putting dates in names might not undermine this 
principle.  For future naming, on minor changes (or even pre-scheduled reviews 
with no changes), update the date part, on major changes, start from scratch 
(as in 3.2024, or even use different letters ... ).  

By the way, I'm sorry if my opinion diverges from the currently forming 
consensus.

Just my $0.02.
  
Dan

PS Just to be clear, if votes are to be tallied, my vote on this issue 
should be weighted quite low (i.e. 0, unless other votes are weighted low too, 
and some kind of tie-breaker is needed), for at least three reasons: I have not 
followed the TLS 1.3/2.0 spec closely (i.e., I had no part in building the 
shed); I have nearly zero experience dealing with user interpretation (i.e. 
marketing) of protocol names; my preference is weak. (Enough to deserve a 
negative weight, if that were not cheatable;)

PPS I've said before that I prefer TLC(rypto) to TLS(ecurity), but that's 
unlikely to fly, and it may be okay to grandfather this tradition.  (I hope 
names of future crypto protocols (that TLS WG might work on) can be more 
specific and realistic.)

-Original Message-
From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Dave Garrett
Sent: Tuesday, November 22, 2016 5:07 PM
To: tls@ietf.org
Subject: Re: [TLS] Confirming consensus: TLS1.3->TLS*

(replies to a bunch of ideas in this thread)

As the person who lit the match under this latest bikeshed debate, 
personally, I don't see a strong consensus building here. Leaving the bikeshed 
unpainted seems like the option we're headed for, at this rate. I'm fine with 
TLS 1.3 if that's the result here.

That said, I think I've been somewhat swayed to the TLS 4 camp with the 
"fourth version of TLS" message. It makes a kind of messy sense that's kind of 
fitting for TLS. I'm no longer against it.

I've also suggested highlighting the year in the past, but only in the 
context of the title and messaging, not actually replacing the version number 
itself. I'd be ok with TLS 1.3-2017 (or something), not doing a find/replace of 
1.3 and changing it to 2017, wholesale. That just feels even more confusing.

Lastly, I am vehemently against the suggestion of ditching the TLS name in 
favor of SSL again, as was also brought up in this thread. SSL is dead and 
insecure, and that message needs to stay. We need to get people to stop 
conflating the two and making this worse, not accepting it.


Dave


On Sunday, November 20, 2016 08:16:07 pm Eric Rescorla wrote:
> I mildly prefer TLS 1.3 to TLS 2 and TLS 4 (If we're going to rev the 
> major version number we should abandon the minor one).
> TLS 2017 strikes me as quite bad; we're certainly not planning to do a 
> TLS 2018. I am strongly opposed to TLS 2017.
> 
> -Ekr
> 
> 
> On Fri, Nov 18, 2016 at 11:12 AM, Sean Turner  wrote:
> 
> > At IETF 97, the chairs lead a discussion to resolve whether the WG 
> > should rebrand TLS1.3 to something else.  Slides can be found @
> > 
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_proceedings_97_slides_slides-2D&d=DwICAg&c=N0Urj2691w_G_RMcId8BFO255JhwY1mUG9mQ4wCsdg4&r=NdXACqSCqnic2vXFj2sB1wqEOVaLJ9XgezFa4hmJAmA&m=aVqgPEkStnO8wlSeHRSGdkuqYUHHonOaRl-oH5L2N2A&s=6yJGiNGx2nAPsm7AaZ_G7L5Z-k0foqrnehHcwnU5MiA&e=
 
> > 97-

[TLS] Point validation (PR#763)

2016-11-28 Thread Eric Rescorla
https://github.com/tlswg/tls13-spec/pull/763

Barring technical objections (e.g., this is incorrect), I intend to merge
this PR requiring point validation on Wednesday.

-Ekr
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Merging pre_shared_key and psk_key_exchange_modes extensions

2016-11-28 Thread Russ Housley
Eric:

> On Mon, Nov 28, 2016 at 11:53 AM, Russ Housley  wrote:
> Only the client ever sends the "psk_key_exchange_modes” extension.  In fact, 
> the server MUST NOT send a "psk_key_exchange_modes" extension.
> 
> The "pre_shared_key” extension is already divided into the structures used by 
> the client and the server.  Why not add the ke_modes to the client part of 
> the "pre_shared_key” extension?
> 
> This version allows you to tell the server that you would support a specific 
> set of modes (so it knows whether to send you a ticket or not) without the 
> need to allow an empty PSK list (with the small side effect that you can 
> check the minimum 1 requirement at the syntax level.

I see.  Thanks.

Russ___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Merging pre_shared_key and psk_key_exchange_modes extensions

2016-11-28 Thread Eric Rescorla
On Mon, Nov 28, 2016 at 11:53 AM, Russ Housley  wrote:

> Only the client ever sends the "psk_key_exchange_modes” extension.  In
> fact, the server MUST NOT send a "psk_key_exchange_modes" extension.
>
> The "pre_shared_key” extension is already divided into the structures used
> by the client and the server.  Why not add the ke_modes to the client part
> of the "pre_shared_key” extension?
>

This version allows you to tell the server that you would support a
specific set of modes (so it knows whether to send you a ticket or not)
without the need to allow an empty PSK list (with the small side effect
that you can check the minimum 1 requirement at the syntax level.


This would have the advantage that the ke_modes would be integrity
> protected by the HMAC carried in the PskBinderEntry.
>

It already is protected.

-Ekr


>
> If I am not missing something, then the following would be one way to
> accomplish this change:
>
>   enum { psk_ke(0), psk_dhe_ke(1), (255) } PskKeyExchangeMode;
>
>   struct {
>   opaque identity<0..2^16-1>;
>   PskKeyExchangeMode ke_modes<1..255>;
>   uint32 obfuscated_ticket_age;
>   } PskIdentity;
>
>   opaque PskBinderEntry<32..255>;
>
>   struct {
>   select (Handshake.msg_type) {
>   case client_hello:
>   PskIdentity identities<6..2^16-1>;
>   PskBinderEntry binders<33..2^16-1>;
>
>   case server_hello:
>   uint16 selected_identity;
>   };
>
>   } PreSharedKeyExtension;
>
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Merging pre_shared_key and psk_key_exchange_modes extensions

2016-11-28 Thread Russ Housley
Only the client ever sends the "psk_key_exchange_modes” extension.  In fact, 
the server MUST NOT send a "psk_key_exchange_modes" extension.

The "pre_shared_key” extension is already divided into the structures used by 
the client and the server.  Why not add the ke_modes to the client part of the 
"pre_shared_key” extension?

This would have the advantage that the ke_modes would be integrity protected by 
the HMAC carried in the PskBinderEntry.

If I am not missing something, then the following would be one way to 
accomplish this change:

  enum { psk_ke(0), psk_dhe_ke(1), (255) } PskKeyExchangeMode;

  struct {
  opaque identity<0..2^16-1>;
  PskKeyExchangeMode ke_modes<1..255>;
  uint32 obfuscated_ticket_age;
  } PskIdentity;

  opaque PskBinderEntry<32..255>;

  struct {
  select (Handshake.msg_type) {
  case client_hello:
  PskIdentity identities<6..2^16-1>;
  PskBinderEntry binders<33..2^16-1>;

  case server_hello:
  uint16 selected_identity;
  };

  } PreSharedKeyExtension;

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Certificate compression (a la QUIC) for TLS 1.3

2016-11-28 Thread Nikos Mavrogiannopoulos
On Sun, 2016-11-27 at 15:13 +, Alessandro Ghedini wrote:
> On Sat, Nov 26, 2016 at 11:42:20PM -0500, Victor Vasiliev wrote:
> > I am currently trying to figure out how much of QUIC certificate
> > compression can be adapted to work with TLS.  I will submit a draft
> > as soon
> > as I have a working prototype.
> 
> FWIW I too have started working on a prototype for gzip compressing
> certificates
> based on BoringSSL:
> https://github.com/ghedo/boringssl/tree/cert_compress
> 
> It's not complete yet and I only implemented compression so far based
> on what
> Chromium does with QUIC. I also haven't really tested it yet (but at
> least it
> builds AFAICT :) ).

I guess one could use the certificate type negotiation mechanism from
RFC7250 to negotiate a compressed certificate, instead of a normal one.

That would require registering an ID at:
http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml


> I'd like to do some tests as well to measure the benefits of this
> (e.g.
> download certificates from CT logs and see how effective the
> compression is).
> 
> I also started working on a draft for gzip compression of
> certificates at:
> https://github.com/ghedo/tls-certificate-compression

Have you considered lz4 instead of zlib?

regards,
Nikos

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls