Re: [TLS] (strict) decoding of legacy_record_version?

2016-11-08 Thread Martin Thomson
On 9 November 2016 at 05:59, Brian Smith wrote: > This isn't a pervasively shared goal, though. It's good to let the browsers > police things if they want, but I think a lot of implementations would > prefer to avoid doing work that isn't necessary for interop or security. If you permit someone t

Re: [TLS] I-D Action: draft-ietf-tls-ecdhe-psk-aead-00.txt

2016-11-08 Thread Martin Thomson
On 8 November 2016 at 21:08, Daniel Migault wrote: > TLS enable curve negotiation but not for code point. This makes restrictions > on code points hard to implement. As a result Endpoints MAY treat > negotiation of key sizes smaller than the lower limits as a connection error > of type insufficie

Re: [TLS] COSIC's look on TLS 1.3

2016-11-08 Thread Eric Rescorla
On Tue, Nov 8, 2016 at 2:33 PM, Ilari Liusvaara wrote: > - Yeah, there have been complaints about lack of state diagram, stating > that the present ladder diagram is not sufficient. > Yeah, I'm taking this point to heart. I've been a bit swamped with implementation matters, but I'll get workin

Re: [TLS] COSIC's look on TLS 1.3

2016-11-08 Thread Ilari Liusvaara
On Tue, Nov 08, 2016 at 03:55:36PM +0100, Roel Peeters wrote: > Dear all, > > just to let you know that we have written a blog post on the current TLS > 1.3 draft, with our remarks that might be of use in your upcoming meeting. > > https://securewww.esat.kuleuven.be/cosic/?p=6624 Some comments:

Re: [TLS] COSIC's look on TLS 1.3

2016-11-08 Thread Dave Garrett
On Tuesday, November 08, 2016 09:55:36 am Roel Peeters wrote: > we are also wondering whether or not the Hello Retry Request will be > included or omitted in the standard. Leaving it out will make TLS 1.3 > vulnerable again to downgrade attacks ... Why are you wondering about this? HRR is in the s

Re: [TLS] COSIC's look on TLS 1.3

2016-11-08 Thread Sean Turner
I let this message through the moderator queue despite the link to the blog; next time please send your comments directly to the list. Note that I wouldn’t necessarily expect anybody to pick up your points for you; PRs are welcome though. spt > On Nov 08, 2016, at 20:25, Roel Peeters wrote:

[TLS] COSIC's look on TLS 1.3

2016-11-08 Thread Roel Peeters
Dear all, just to let you know that we have written a blog post on the current TLS 1.3 draft, with our remarks that might be of use in your upcoming meeting. https://securewww.esat.kuleuven.be/cosic/?p=6624 Best regards, Roel Peeters and Jens Hermans PS: we are also wondering whether or not th

Re: [TLS] (strict) decoding of legacy_record_version?

2016-11-08 Thread Brian Smith
Martin Thomson wrote: > On 8 November 2016 at 14:01, Brian Smith wrote: > > Since this field isn't included in the additional_data of the AEAD in TLS > > 1.3 any more, it isn't authenticated. That means an active MitM can use > this > > to transport up to 2 bytes of information hop-to-hop if the

Re: [TLS] Working Group Last Call for draft-ietf-tls-tls13-18

2016-11-08 Thread Salz, Rich
> the PDUs are still pretty much predictable > heuristically (by their ordering), even when they're padded. ... > So besides being completely pointless, can you describe any realistic problem > that is worth breaking middleware at the endpoints so badly? I found the language difference interest

Re: [TLS] Working Group Last Call for draft-ietf-tls-tls13-18

2016-11-08 Thread Martin Rex
Yoav Nir wrote: > >> On 3 Nov 2016, at 20:20, Martin Rex wrote: >> >>> With visible content type, you can tell these two flows apart. >> >> (a) so what? for those interested, one can tell such flows appart >> pretty reliably by traffic analysis. So there is exactly ZERO >> protection

Re: [TLS] I-D Action: draft-ietf-tls-ecdhe-psk-aead-00.txt

2016-11-08 Thread Daniel Migault
If I understand correctly, you recommend something that is of the flavor in the security recommendation section: TLS enable curve negotiation but not for code point. This makes restrictions on code points hard to implement. As a result Endpoints MAY treat negotiation of key sizes smaller than the

Re: [TLS] I-D Action: draft-ietf-tls-ecdhe-psk-aead-00.txt

2016-11-08 Thread Nikos Mavrogiannopoulos
On Tue, 2016-11-08 at 03:50 -0500, Daniel Migault wrote: > Regarding Niko, my understanding is that the WG preferred not to have > the definition of profiles in this document. I am not sure you wanted > the text to be removed as MUST NOT was to normative or if you would > like no recommendation at

Re: [TLS] I-D Action: draft-ietf-tls-ecdhe-psk-aead-00.txt

2016-11-08 Thread Daniel Migault
Hi Martin, Niko, Thanks for the comment. Regarding Martin comment, I agree the text should not comment the SHAX as these are defined by the cipher suites. What is not clear to me is how the reference to DH should be handled. I also did not feel that the provided text provides different recommendat

Re: [TLS] I-D Action: draft-ietf-tls-ecdhe-psk-aead-00.txt

2016-11-08 Thread Nikos Mavrogiannopoulos
On Mon, 2016-11-07 at 22:09 -0500, Daniel Migault wrote: > Hi,  > > Please find the text I propose. Let me know if you have any comment > regarding the proposed text. Unless I receive comment on it, the text > will be publish as soon as draft submission is possible. > > Yours,  > Daniel > >    T