Re: [TLS] What counts as the same ClientHello?
On 30 August 2017 at 22:57, Ilari Liusvaarawrote: > However, I identified a new category of extensions that I didn't notice > before: Dependent on altered extensions. There are no such standardized > extensions, but there is at least one proposal (in WG draft stage). Is it possible that you could help us by sharing which one? I would however suggest that this sort of dependency is already possible. We have a few places in our code that checks certain conditions after extension processing because of dependencies between extensions. In particular, the pre_shared_key and early_data extensions trigger a lot of cross checking because they change the protocol in fairly fundamental ways. ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls
Re: [TLS] What counts as the same ClientHello?
On Tue, Aug 29, 2017 at 01:29:55PM -0500, Benjamin Kaduk wrote: > Hi Ilari, > > Thanks for the by-extension categorization/breakdown. Sigh, I missed cached_info, because that does not appear in TLS 1.3 extension lists. It falls into "unsafe to alter because unknown commitments" category. However, I identified a new category of extensions that I didn't notice before: Dependent on altered extensions. There are no such standardized extensions, but there is at least one proposal (in WG draft stage). The latter kind of extensions is incompatible with MUST be the same except requirement. -Ilari ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls
[TLS] CoAP, TLS and ALPN
Hi all, I would need your deployment experience with the use of ALPN. Here is the background: With the CoAP over TCP/TLS described in https://tools.ietf.org/html/draft-ietf-core-coap-tcp-tls-09 we are defining how to run CoAP over TCP and TLS. CoAP is a protocol typically used in the Internet of Things environment, which was initially designed to operate over UDP. To ensure proper multiplexing we offer two approaches, namely one using ALPN and the other one is to use a dedicated port. The suggestion was made to only use ALPN (see https://github.com/core-wg/coap-tcp-tls/issues/155). This is may be fine since many stacks implement ALPN already (including embedded TLS stacks). What is the situation on the TLS loadbalancer/concentrator side? Do these boxes also forward the ALPN information to the application server? Has someone run into operational issues with ALPN on the server-side? Ciao Hannes ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls
Re: [TLS] TLS-in-TLS tunneling use cases (was: SNI Encryption)
On Fri, Aug 18, 2017 at 3:46 PM, Daniel Kahn Gillmorwrote: > While i think i understand where you're coming from, Tony, i can't help > but note that this use case is difficult to distinguish from a regime > that: > > (a) wants to forbid anonymous speech, and > > (b) wants to censor "unapproved" information sources, and > > (c) wants the capacity to undermine freedom of association. > > That makes me wary, and i hope that SNI Encryption is *not* conflated > with these particular use cases. > TLS tunnels have a multitude of use cases, from SNI encryption to service discovery-aware load balancers to Tor-like anonymity networks to privacy-preserving payment channel networks to my much more mundane "Squid-like authenticated egress proxy" problem. I'm simply asking that if tunnels become the mechanism by which SNI encryption is ultimately implemented, that all of the potential use cases of tunnels are considered, rather than observing the problem through the microcosm that is "SNI Encryption". Note that I'm proposing absolutely nothing new, just asking that the tunneling problem be considered from more angles than one. If TLS contains (mis)features which forbid anonymous speech or censor unapproved information sources, I'm afraid that the ship has already sailed there. But perhaps, well-implemented TLS tunnels could ultimately help route around censorship. -- Tony Arcieri ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls