Re: [TLS] draft-ietf-tls-exported-authenticator questions

2017-07-21 Thread Watson Ladd
On Fri, Jul 21, 2017 at 10:34 PM, Ilari Liusvaara wrote: > On Fri, Jul 21, 2017 at 10:17:08PM -0700, Watson Ladd wrote: >> On Fri, Jul 21, 2017 at 12:55 PM, Benjamin Kaduk wrote: >> > Unrelated to Ilari's questions, I wonder if we want to say anything about >> > certificate_request_context values

Re: [TLS] draft-ietf-tls-exported-authenticator questions

2017-07-21 Thread Ilari Liusvaara
On Fri, Jul 21, 2017 at 10:17:08PM -0700, Watson Ladd wrote: > On Fri, Jul 21, 2017 at 12:55 PM, Benjamin Kaduk wrote: > > Unrelated to Ilari's questions, I wonder if we want to say anything about > > certificate_request_context values being unique across both in-TLS > > post-handshake auth and ex

Re: [TLS] draft-ietf-tls-exported-authenticator questions

2017-07-21 Thread Watson Ladd
On Fri, Jul 21, 2017 at 12:55 PM, Benjamin Kaduk wrote: > Unrelated to Ilari's questions, I wonder if we want to say anything about > certificate_request_context values being unique across both in-TLS > post-handshake auth and exported authenticators. This context is not a security sensitive thin

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Dr Stephen Henson
On 21/07/2017 16:00, Ilari Liusvaara wrote: > > I suppose some new dual-version TLS 1.2/1.3 libraries might have the > same issue as mine: supported groups is just plain ignored for ECDSA, > and siganture algorithms have the TLS 1.3 meanings, even in TLS 1.2. > That is potentially a problem yes.

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Dr Stephen Henson
-- Dr Stephen N. Henson. Founder member of the OpenSSL project: http://www.openssl.org/ On 21/07/2017 20:45, Dr Benjamin Kaduk wrote: > On 07/21/2017 08:41 AM, Dr Stephen Henson wrote: >> On 21/07/2017 14:23, Hubert Kario wrote: >>> Signature Algorithms for ECDSA now define both the curve and the

Re: [TLS] draft-ietf-tls-exported-authenticator questions

2017-07-21 Thread Benjamin Kaduk
Unrelated to Ilari's questions, I wonder if we want to say anything about certificate_request_context values being unique across both in-TLS post-handshake auth and exported authenticators. -Ben ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mail

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Dr Benjamin Kaduk
On 07/21/2017 08:41 AM, Dr Stephen Henson wrote: > On 21/07/2017 14:23, Hubert Kario wrote: >> Signature Algorithms for ECDSA now define both the curve and the hash >> algorithm: >> >> ecdsa_secp256r1_sha256(0x0403), ecdsa_secp384r1_sha384(0x0503), >> ecdsa_secp521r1_sha512(0x0603), >> >> This is

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Benjamin Kaduk
On 07/21/2017 09:34 AM, Hubert Kario wrote: > On Friday, 21 July 2017 15:38:32 CEST Benjamin Kaduk wrote: >> On 07/21/2017 08:23 AM, Hubert Kario wrote: >>> Signature Algorithms for ECDSA now define both the curve and the hash >>> >>> algorithm: >>> ecdsa_secp256r1_sha256(0x0403), >>>

Re: [TLS] SNI with early data

2017-07-21 Thread Benjamin Kaduk
I put some proposed tidying in https://github.com/tlswg/tls13-spec/pull/1061 . More inline. On 07/21/2017 05:14 AM, Matt Caswell wrote: > On 20/07/17 18:10, Benjamin Kaduk wrote: >> On 07/20/2017 04:51 AM, Matt Caswell wrote: >>> I note in draft-21 the following text: >>> >>>When clients use

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Watson Ladd
On Fri, Jul 21, 2017 at 8:00 AM, Ilari Liusvaara wrote: > On Fri, Jul 21, 2017 at 02:41:50PM +0100, Dr Stephen Henson wrote: > > On 21/07/2017 14:23, Hubert Kario wrote: > > > Signature Algorithms for ECDSA now define both the curve and the hash > > > algorithm: > > > > > > ecdsa_secp256r1_sha256

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Ilari Liusvaara
On Fri, Jul 21, 2017 at 02:41:50PM +0100, Dr Stephen Henson wrote: > On 21/07/2017 14:23, Hubert Kario wrote: > > Signature Algorithms for ECDSA now define both the curve and the hash > > algorithm: > > > > ecdsa_secp256r1_sha256(0x0403), ecdsa_secp384r1_sha384(0x0503), > > ecdsa_secp521r1_sha51

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Hubert Kario
On Friday, 21 July 2017 15:38:32 CEST Benjamin Kaduk wrote: > On 07/21/2017 08:23 AM, Hubert Kario wrote: > > Signature Algorithms for ECDSA now define both the curve and the hash > > > > algorithm: > > ecdsa_secp256r1_sha256(0x0403), > > ecdsa_secp384r1_sha384(0x0503), > >

Re: [TLS] WG Call for adoption of draft-rescorla-tls-subcerts

2017-07-21 Thread Russ Housley
Nick: Thanks for this summary. This resolves my previous concerns. Russ > On Jul 18, 2017, at 7:06 AM, Nick Sullivan > wrote: > > Sean, > > We've had some additional discussions in person here at IETF 99 with folks > who were in the proxy certificates and short-lived certs camp, and we th

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Dr Stephen Henson
On 21/07/2017 14:23, Hubert Kario wrote: > Signature Algorithms for ECDSA now define both the curve and the hash > algorithm: > > ecdsa_secp256r1_sha256(0x0403), ecdsa_secp384r1_sha384(0x0503), > ecdsa_secp521r1_sha512(0x0603), > > This is in contrast to the TLS 1.2 protocol, where any hash can

Re: [TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Benjamin Kaduk
On 07/21/2017 08:23 AM, Hubert Kario wrote: > Signature Algorithms for ECDSA now define both the curve and the hash > algorithm: > > ecdsa_secp256r1_sha256(0x0403), > ecdsa_secp384r1_sha384(0x0503), > ecdsa_secp521r1_sha512(0x0603), > > This is in contrast to the TLS

[TLS] Consistency for Signature Algorithms?

2017-07-21 Thread Hubert Kario
Signature Algorithms for ECDSA now define both the curve and the hash algorithm: ecdsa_secp256r1_sha256(0x0403), ecdsa_secp384r1_sha384(0x0503), ecdsa_secp521r1_sha512(0x0603), This is in contrast to the TLS 1.2 protocol, where any hash can be used with any curve.

Re: [TLS] notes for TLS WG Session 2 at IETF 99

2017-07-21 Thread Kathleen Moriarty
Hi, The email seems to be missing some text that was in the etherpad (or reordered maybe), so here it is again: IETF99 TLS WG 2nd session (19-July-2017) (all errors are JLH's) Agenda/Administrivia Exported Authenticators (EKR) draft 21, hopefully close WGLC #2 ended yesterday Changes since

Re: [TLS] Is there a way forward after today's hum?

2017-07-21 Thread Ted Lemon
As I said in the previous message, the 3270 was the original web browser. What I mean by that is that the 3270 transaction model is basically a primitive version of http: you throw up a page, the user enters some data, then the user hits send and all the data goes to the server at once. The reaso

Re: [TLS] SNI with early data

2017-07-21 Thread Matt Caswell
On 20/07/17 18:10, Benjamin Kaduk wrote: > On 07/20/2017 04:51 AM, Matt Caswell wrote: >> I note in draft-21 the following text: >> >>When clients use a PSK obtained externally to send early data, then >>the following additional information MUST be provisioned to both >>parties: >> >>

Re: [TLS] Is there a way forward after today's hum?

2017-07-21 Thread Ackermann, Michael
Ted You may be aware that most enterprises have been migrating away from 3270 for 20 years or more. Very little still exists. What little does exist is usually implemented via tn3270. In the browser scenario you describe I would expect the Server side to be a tn3270 server, but you will