Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-09-24 Thread Julien ÉLIE
Hi Bill, Well, it depends. How much security do people need. In the NNTP case, I can't see a strong argument for confidentiality. There may be a need for compression, which is why I suggested a "TLC" (Transport Level Compression) facility, which is, to the extent possible, API compatible with a

Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-09-24 Thread Julien ÉLIE
Hi Yoav, And you don’t usually need 25 Mbps for NNTP, although the last time I actually used NNTP was over a 56Kbps modem. Yep, accessing text-only newsgroups is fine with a 56Kbps modem, though getting overview data (roughly the headers of the articles) may take time on the "subscription" t

Re: [TLS] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Nikos Mavrogiannopoulos
On Thu, 2015-09-24 at 18:26 +0300, Ilari Liusvaara wrote: > On Thu, Sep 24, 2015 at 04:03:28PM +0200, Nikos Mavrogiannopoulos > wrote: > > On Thu, 2015-09-24 at 15:27 +0300, Ilari Liusvaara wrote: > > > > > 4) For TLS PoP signatures, does it make sense to use HashEdDSA at > > > all? > > > Another

Re: [TLS] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Ilari Liusvaara
On Thu, Sep 24, 2015 at 04:03:28PM +0200, Nikos Mavrogiannopoulos wrote: > On Thu, 2015-09-24 at 15:27 +0300, Ilari Liusvaara wrote: > > > 4) For TLS PoP signatures, does it make sense to use HashEdDSA at > > all? > > Another way would to always use PureEdDSA and perform hash separtion > > from TL

[TLS] Fwd: Nomcom 2015: Third and FINAL call for nominations

2015-09-24 Thread Sean Turner
Just in case you’re not on the IETF discuss list. spt Begin forwarded message: > From: NomCom Chair 2015 > Subject: Nomcom 2015: Third and FINAL call for nominations > Date: September 24, 2015 at 08:29:06 EDT > To: "IETF Announcement List" > Reply-To: i...@ietf.org > > This is the THIRD call

Re: [TLS] '15 TLS Fall Interim Minutes

2015-09-24 Thread Sean Turner
>> ## Data transfer limitation per connection (issue 125/4) >> >> After quibbling with the math a bit, we need to specify how good we >> think the current ciphers are numbers. > > Parse error. Does this mean something like "how much data current > ciphers can safely encrypt”? It does. I’ll upd

Re: [TLS] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Blumenthal, Uri - 0553 - MITLL
For this reason (among others) I am against PureEdDSA. ‎HashEdDSA dooes the job well enough.  Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network.   Original Message   From: Nikos Mavrogiannopoulos Sent: Thursday, September 24, 2015 10:04 To: Ilari Liusvaara; Simon Josefs

Re: [TLS] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Nikos Mavrogiannopoulos
On Thu, 2015-09-24 at 15:27 +0300, Ilari Liusvaara wrote: > 4) For TLS PoP signatures, does it make sense to use HashEdDSA at > all? > Another way would to always use PureEdDSA and perform hash separtion > from TLS side (e.g. sign(privkey, hash_func_id|H(tbs_data))). > The certificate signatures a

Re: [TLS] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Ilari Liusvaara
On Wed, Sep 23, 2015 at 10:33:29AM +0200, Simon Josefsson wrote: > Hi all, > > I have pushed out a new version of the document describing EdDSA public > keys, signatures and certificates for PKIX. The change in -03 include > the addition of the prehash mode, test vectors generated by GnuTLS, and

Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-09-24 Thread Nikos Mavrogiannopoulos
On Thu, 2015-09-24 at 10:52 +0300, Yoav Nir wrote: > > On other lists I still see the occasional quip about suffering a > > low > > bandwidth connection. It used to be folks in some European > > countries, > > but most recently I seem to recall South American. (I think we're > > seeing the shift b

Re: [TLS] [pkix] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Nikos Mavrogiannopoulos
On Thu, 2015-09-24 at 13:23 +1000, Manger, James wrote: > The cert's notBefore field is a UTCTime value (2-digit year), while > the notAfter field is a GeneralizedTime value (4-digit year). I don't > think I has seen that before, but it is valid. Hi, Thanks for the comments, they should be addre

Re: [TLS] Updated EdDSA/Ed25519 PKIX document

2015-09-24 Thread Simon Josefsson
"Manger, James" writes: > Hi Simon, two technical typos: > > The example cert in 8.2 has the wrong OID for the signature. > Cert has { 1 3 101 100 1 } [encoding 06 04 2B656401] > Text has { 1 3 101 101 } [encoding 06 03 2B6565] for id-EdDSASignature Hi James. Good catch -- I believe that is

Re: [TLS] TLS 1.3 - Support for compression to be removed

2015-09-24 Thread Yoav Nir
> On Sep 24, 2015, at 7:40 AM, Jeffrey Walton wrote: > >> I have to wonder if it’s worth it. In the last decade bandwidth has >> increased and prices for networking have gone down much faster than CPU >> speeds. 10 years ago having 1 Mbps at home was the highest-end broadband >> you could ge