Re: [TLS] Francesca Palombini's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Hannes Tschofenig
Hi Francesca, ~ snip ~ 5. - Section 10.2 FP: Just checking - why is 53 "incompatible with this document"? [Hannes] Maybe someone responded already regarding this point. I don't know whether it is good or bad practice to provide all this background in the IANA considerations but the story

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Hannes Tschofenig
Hi John, Hi Ekr, Regarding the presentation language used in the document I have added a clarification to the terminology section, see https://github.com/tlswg/dtls-conn-id/pull/110. I hope this addresses the issue. Ciao Hannes From: Eric Rescorla Sent: Tuesday, April 20, 2021 11:32 PM To:

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Hannes Tschofenig
Hi John, Hi Ekr, I hope I correctly understand the essence of your conversation. I am wondering whether a link from the bullet list to the text two paragraphs down will help. Here is my proposal: https://github.com/tlswg/dtls-conn-id/pull/111 Ciao Hannes From: John Scudder Sent: Wednesday, Ap

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Achim Kraus
HI John, Am 21.04.21 um 00:42 schrieb John Scudder: 3. Section 6:    *  There is a strategy for ensuring that the new peer address is able       to receive and process DTLS records.  No such strategy is defined       in this specification. This is a little mind-bog

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Carrick Bartle
> That in turn implies that getting an IP-based certificate might be easier > than a DV certificate (and the associated name). I'd need more supporting > evidence to believe that. Under what conditions could that be true? I'm not making any claims at all about the ease with which one can get

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Martin Thomson
On Wed, Apr 21, 2021, at 11:48, Carrick Bartle wrote: > > I'm not sure what you are implying might be impossible. Are you suggesting > > that it might be impossible to get a name for which you could get a > > certificate? > > No. I'm implying that if we don't allow clients to authenticate > cl

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Carrick Bartle
> In general, I'd prefer we get ECH deployed for some major use > cases and not try fill in every possible niche at this point. That's fine with me. > On Apr 20, 2021, at 7:03 PM, Stephen Farrell > wrote: > > > Hiya, > > To answer Chris' initial question: I can't currently think of > a real

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Stephen Farrell
Hiya, To answer Chris' initial question: I can't currently think of a real use-case where the client would need to authenticate an IP address for a client-facing server in the event that ECH decryption has been tried and failed. And, I very much sympathise with Martin's goal of simplifying if w

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Carrick Bartle
> I'm not sure what you are implying might be impossible. Are you suggesting > that it might be impossible to get a name for which you could get a > certificate? No. I'm implying that if we don't allow clients to authenticate client-facing servers with an IP-based certificate, ECH won't be pos

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Martin Thomson
On Wed, Apr 21, 2021, at 11:30, Carrick Bartle wrote: > This does sound unusual. That said, if this sort of set-up is possible > (which presumably it is), it seems unfortunate to make ECH impossible > in that scenario. I'm not sure what you are implying might be impossible. Are you suggesting

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Carrick Bartle
> we're talking about a host that fronts for multiple different names, so I'm > finding it hard to imagine how finding a name usable for this purpose would > be challenging. This does sound unusual. That said, if this sort of set-up is possible (which presumably it is), it seems unfortunate to

Re: [TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Martin Thomson
On Wed, Apr 21, 2021, at 10:33, Christopher Wood wrote: > Taking a step back, it would be great if we could reach consensus on > whether or not this is a use case we actually want to solve. The Web currently recognizes IP certificates. The specs, thanks RFC 6125, largely missed this, but we're

[TLS] Authenticating the client-facing server with an IP-based certificate

2021-04-20 Thread Christopher Wood
Issue #424 tracks whether or not we want to allow clients to authenticate client-facing servers with an IP-based certificate: https://github.com/tlswg/draft-ietf-tls-esni/issues/424 There are a number of different proposals for _how_ we might enable this, varying in how the name and addresse

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread John Scudder
On Apr 20, 2021, at 7:24 PM, Eric Rescorla wrote: On Tue, Apr 20, 2021 at 3:42 PM John Scudder mailto:j...@juniper.net>> wrote: On Apr 20, 2021, at 5:32 PM, Eric Rescorla mailto:e...@rtfm.com>> wrote: 3. Section 6: * There is a strategy for ensuring that the new peer address is able

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread John Scudder
> On Apr 20, 2021, at 7:33 PM, Rob Sayre wrote: > > The ECH (nee ESNI) spec says "All TLS notation comes from [RFC8446], Section > 3." Something like that should work fine here, in "Conventions and > Terminology". Yes, that would be fine from my point of view. —John _

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Rob Sayre
On Tue, Apr 20, 2021 at 3:42 PM John Scudder wrote: > On Apr 20, 2021, at 5:32 PM, Eric Rescorla wrote: > > This seems like a pretty basic assumption. These aren't just notational > conventions > or pseudo-code. They're the protocol description language that TLS is > defined in. > If one isn't f

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Eric Rescorla
On Tue, Apr 20, 2021 at 3:42 PM John Scudder wrote: > On Apr 20, 2021, at 5:32 PM, Eric Rescorla wrote: > > 3. Section 6: >> >>* There is a strategy for ensuring that the new peer address is able >> to receive and process DTLS records. No such strategy is defined >> in this spe

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread John Scudder
On Apr 20, 2021, at 5:32 PM, Eric Rescorla mailto:e...@rtfm.com>> wrote: This seems like a pretty basic assumption. These aren't just notational conventions or pseudo-code. They're the protocol description language that TLS is defined in. If one isn't familiar with how to read this syntax, then

Re: [TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Eric Rescorla
On Tue, Apr 20, 2021 at 2:09 PM John Scudder via Datatracker < nore...@ietf.org> wrote: > John Scudder has entered the following ballot position for > draft-ietf-tls-dtls-connection-id-11: No Objection > > When responding, please keep the subject line intact and reply to all > email addresses incl

[TLS] John Scudder's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread John Scudder via Datatracker
John Scudder has entered the following ballot position for draft-ietf-tls-dtls-connection-id-11: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please ref

[TLS] Martin Duke's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Martin Duke via Datatracker
Martin Duke has entered the following ballot position for draft-ietf-tls-dtls-connection-id-11: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refe

Re: [TLS] Francesca Palombini's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Thomas Fossati
Hi Francesca, thank you for your review. The ticket to track your review is: https://github.com/tlswg/dtls-conn-id/issues/106 cheers! On Tue, Apr 20, 2021 at 5:22 PM Francesca Palombini via Datatracker wrote: > > Francesca Palombini has entered the following ballot position for > draft-ietf-tls

Re: [TLS] Francesca Palombini's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Achim Kraus
Hello Francesca, > 5. - > > Section 10.2 > > FP: Just checking - why is 53 "incompatible with this document"? The 53 was is used with the MAC definition of the previous version 06 of this draft. Though the MAC has been adapted, using a different extension number makes it easier to migrate ex

[TLS] Francesca Palombini's No Objection on draft-ietf-tls-dtls-connection-id-11: (with COMMENT)

2021-04-20 Thread Francesca Palombini via Datatracker
Francesca Palombini has entered the following ballot position for draft-ietf-tls-dtls-connection-id-11: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Ple