[TLS] I-D Action: draft-ietf-tls-hybrid-design-01.txt

2020-10-15 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Transport Layer Security WG of the IETF. Title : Hybrid key exchange in TLS 1.3 Authors : Douglas Stebila Scott Fluhrer

Re: [TLS] [Last-Call] Last Call: (Deprecating MD5 and SHA-1 signature hashes in TLS 1.2) to Proposed Standard

2020-10-15 Thread Donald Eastlake
Hi, On Thu, Oct 15, 2020 at 5:56 AM Martin Rex wrote: > > The IESG wrote: > > > > The IESG has received a request from the Transport Layer Security WG (tls) > > to > > consider the following document: - 'Deprecating MD5 and SHA-1 signature > > hashes in TLS 1.2' > > > >as Proposed Standard

Re: [TLS] Fwd: Re: AD review of draft-ietf-tls-dtls-connection-id-07

2020-10-15 Thread Eric Rescorla
I would like to make several points here: - In terms of operational practice, in order for a server to function correctly, the CID must either be fixed-length for all clients that might need to be demuxed *or* self-describing. Otherwise, the server will not be able to determine the correct CID. I

Re: [TLS] Last Call: (Deprecating MD5 and SHA-1 signature hashes in TLS 1.2) to Proposed Standard

2020-10-15 Thread Martin Rex
The IESG wrote: > > The IESG has received a request from the Transport Layer Security WG (tls) to > consider the following document: - 'Deprecating MD5 and SHA-1 signature > hashes in TLS 1.2' > >as Proposed Standard > > The IESG plans to make a decision in the next few weeks, and solicits

Re: [TLS] Fwd: Re: AD review of draft-ietf-tls-dtls-connection-id-07

2020-10-15 Thread Achim Kraus
Hi Ben, The attack does not require that both are valid for the same peer at the same time -- the attack can still occur when the party producing the MAC is induced to use the "wrong" (invalid CID) interpretation of the byte stream but then the version with valid CID is presented to the party