Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Arnaud Taddei
Am comfortable too From: TLS on behalf of Salz, Rich Date: Wednesday, 6 December 2023 at 13:50 To: Deirdre Connolly , TLS@ietf.org Subject: Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze' At the TLS meeting at IETF 118 there was significant support for the draft 'TLS 1.2 is in Feature

Re: [TLS] "Notes" column in draft-ietf-tls-rfc8447bis?

2023-12-06 Thread Salz, Rich
I am not aware of any particular work to say which ciphers can be used where. ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Re: [TLS] "Notes" column in draft-ietf-tls-rfc8447bis?

2023-12-06 Thread Salz, Rich
Yes, I think information regarding if a cipher suite is for TLS 1.3 is very needed to have. I already asked for that in

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Peter Gutmann
Deirdre Connolly writes: >At the TLS meeting at IETF 118 there was significant support for the draft >'TLS 1.2 is in Feature Freeze' ( >https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This call is >to confirm this on the list. Please indicate if you support the adoption of

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Dan Harkins
  Hi,   I approve of this transition to standards track and I am implementing this as well.   regards,   Dan. On 11/29/23 7:51 AM, Joseph Salowey wrote: RFC 8773 (TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key) was originally published as experimental

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Dmitry Belyavsky
I support adoption of this draft. On Wed, Dec 6, 2023 at 6:34 AM Deirdre Connolly wrote: > At the TLS meeting at IETF 118 there was significant support for the draft > 'TLS 1.2 is in Feature Freeze' ( > https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This > call is to confirm

Re: [TLS] RFC88447bis: additional DE instructions

2023-12-06 Thread Salz, Rich
https://github.com/tlswg/rfc8447bis/pull/50 I have three comments, that I posted to the issue: 1. What does "discourage" mean? Imagine this email exchange: Author: I want to register my new UNBREAKABLE crypto alg DE: No Author: But I can't break it DE: No

Re: [TLS] "Notes" column in draft-ietf-tls-rfc8447bis?

2023-12-06 Thread Ilari Liusvaara
On Wed, Dec 06, 2023 at 03:46:32PM +, John Mattsson wrote: > That sounds great. > > Who is doing the work of adding “for TLS 1.3 and later”? > > My understanding is that the currently registered TLS 1.3 cipher suites are: > > Value Description > 0x13,0x01 TLS_AES_128_GCM_SHA256 > 0x13,0x02

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Arnaud Taddei
Speaking of this, just a naïve question, is there anyone who knows about a survey with say enterprise organizations on how they see TLS1.2 and their plans to move to TLS1.3 and where they struggle with? If not, would it be an idea to organize a survey? Just 0.02 CHF From: TLS on behalf of

[TLS] RFC88447bis: additional DE instructions

2023-12-06 Thread Sean Turner
Hi! A thread over on the IRTF’s CFRG list, see [0], has resulted in a PR, see [1], that includes additional instructions for the designated experts related to “Expert Review of Current and Potential IETF and IRTF Documents". Please let us know what you think about the contents of the PR (here

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Stephen Farrell
On 06/12/2023 05:33, Deirdre Connolly wrote: At the TLS meeting at IETF 118 there was significant support for the draft 'TLS 1.2 is in Feature Freeze' ( https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This call is to confirm this on the list. Please indicate if you support

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Sean Turner
> On Dec 6, 2023, at 07:57, Stephen Farrell wrote: > > Signed PGP part > > > On 06/12/2023 05:33, Deirdre Connolly wrote: >> At the TLS meeting at IETF 118 there was significant support for the draft >> 'TLS 1.2 is in Feature Freeze' ( >>

Re: [TLS] "Notes" column in draft-ietf-tls-rfc8447bis?

2023-12-06 Thread Sean Turner
> On Dec 6, 2023, at 08:02, Salz, Rich > wrote: > > Yes, I think information regarding if a cipher suite is for TLS 1.3 is very > needed to have. I already asked for that in > https://mailarchive.ietf.org/arch/msg/tls/0gDKfXJvAemFDm7MWcS1DTDVIe8/ > > In addition, I would also like to

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread David Benjamin
I support adoption and am willing to review. On Wed, Dec 6, 2023 at 12:34 AM Deirdre Connolly wrote: > At the TLS meeting at IETF 118 there was significant support for the draft > 'TLS 1.2 is in Feature Freeze' ( > https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This > call is

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread John Mattsson
I support adoption. I also support making TLS 1.2 not recommended, discouraged, and deprecated. TLS 1.2 can be anything from quite good to very bad depending on configuration. Any work on TLS 1.2 is just delaying deployment of TLS 1.3. Cheers, John Preuß Mattsson From: TLS on behalf of

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Salz, Rich
At the TLS meeting at IETF 118 there was significant support for the draft 'TLS 1.2 is in Feature Freeze'

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Nimrod Aviram
> As the co-author, I support this and am willing to continue working on it as needed. Same here. On Wed, 6 Dec 2023 at 14:51, Salz, Rich wrote: > At the TLS meeting at IETF 118 there was significant support for the draft > 'TLS 1.2 is in Feature Freeze' ( >

Re: [TLS] "Notes" column in draft-ietf-tls-rfc8447bis?

2023-12-06 Thread John Mattsson
That sounds great. Who is doing the work of adding “for TLS 1.3 and later”? My understanding is that the currently registered TLS 1.3 cipher suites are: Value Description DTLS 1.3 QUIC 0x13,0x01 TLS_AES_128_GCM_SHA256 Y Y 0x13,0x02 TLS_AES_256_GCM_SHA384 Y Y 0x13,0x03

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread John Mattsson
Hi, I am quite convinced that the security properties are not worse than a mixture of PSK authentication, PSK key exchange, (EC)DHE key exchange, and signature authentication. In some cases, this is very good. You get the quantum-resistance of the PSK together with the PFS of ECDHE, and the

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Christopher Patton
I support adoption. Chris P. On Tue, Dec 5, 2023 at 9:34 PM Deirdre Connolly wrote: > At the TLS meeting at IETF 118 there was significant support for the draft > 'TLS 1.2 is in Feature Freeze' ( > https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This > call is to confirm this

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Bob Beck
I support adoption and am willing to review. On Tue, Dec 5, 2023 at 10:34 PM Deirdre Connolly wrote: > At the TLS meeting at IETF 118 there was significant support for the draft > 'TLS 1.2 is in Feature Freeze' ( > https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This > call is

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Ilari Liusvaara
On Tue, Dec 05, 2023 at 06:24:33PM -0800, Christian Huitema wrote: > > Yes. Both are used to compute the "early secret" -- external PSK for the > initial handshake, resumption PSK in subsequent handshakes. If the secrets > are "short" and the attacker can use early data as some kind of oracle,

Re: [TLS] "Notes" column in draft-ietf-tls-rfc8447bis?

2023-12-06 Thread Valery Smyslov
Hi John, just a clarification: The _GOSTR341112_ seems to include authentication and key exchange…. I did not think this was how TLS 1.3 cipher suites were supposed to be used. No, they include only hash (GOSTR341112) and AEAD cipher (MAGMA_MGM or KUZNYECHIK_MGM).

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Russ Housley
Stephen: Maybe. ECH would need to be updated to use PQC algorithms to get that protection. Ill add that point: Appendix E.6 of [RFC8446] discusses identity-exposure attacks on PSKs. Also, Appendix C.4 of [I-D.ietf-tls-rfc8446bis] discusses tracking prevention. The guidance in these

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Stephen Farrell
Hiya, On 06/12/2023 21:06, Russ Housley wrote: Stephen: Maybe. ECH would need to be updated to use PQC algorithms to get that protection. Ill add that point: Appendix E.6 of [RFC8446] discusses identity-exposure attacks on PSKs. Also, Appendix C.4 of [I-D.ietf-tls-rfc8446bis]

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Marten Seemann
I support adoption. On Thu, 7 Dec 2023 at 05:55, David Schinazi wrote: > I support adoption. > David > > On Wed, Dec 6, 2023 at 4:16 PM Rob Sayre wrote: > >> Hi, >> >> I support adoption. >> >> thanks, >> Rob >> >> >> On Tue, Dec 5, 2023 at 9:35 PM Deirdre Connolly >> wrote: >> >>> At the TLS

Re: [TLS] ECH: Changes to IANA consideration section

2023-12-06 Thread Stephen Farrell
Hiya, On 06/12/2023 19:46, Sean Turner wrote: Okay a new proposal the ech_outer_extensions registration: - Set "TLS 1.3" column to “CH” - Include the following note in our new “Comments” column [0]: "Only appears in inner CH." Plenty good enough from my POV. Cheers, S. spt [0] PRs:

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread Rob Sayre
Hi, I support adoption. thanks, Rob On Tue, Dec 5, 2023 at 9:35 PM Deirdre Connolly wrote: > At the TLS meeting at IETF 118 there was significant support for the draft > 'TLS 1.2 is in Feature Freeze' ( > https://datatracker.ietf.org/doc/draft-rsalz-tls-tls12-frozen/) This > call is to

Re: [TLS] Adoption call for 'TLS 1.2 Feature Freeze'

2023-12-06 Thread David Schinazi
I support adoption. David On Wed, Dec 6, 2023 at 4:16 PM Rob Sayre wrote: > Hi, > > I support adoption. > > thanks, > Rob > > > On Tue, Dec 5, 2023 at 9:35 PM Deirdre Connolly > wrote: > >> At the TLS meeting at IETF 118 there was significant support for the >> draft 'TLS 1.2 is in Feature

Re: [TLS] ECH: Changes to IANA consideration section

2023-12-06 Thread Sean Turner
Okay a new proposal the ech_outer_extensions registration: - Set "TLS 1.3" column to “CH” - Include the following note in our new “Comments” column [0]: "Only appears in inner CH." spt [0] PRs: https://github.com/tlswg/rfc8447bis/pull/48 https://github.com/tlswg/rfc8447bis/pull/49 > On Nov 29,

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Stephen Farrell
Hiya, (3) The privacy considerations already talk about Appendix E.6 of [RFC8446]. I am please to add a pointer to ECH, but I do not think that ECH use should not be mandated. While I'm a fan of ECH, does it actually do the trick here? If the adversary has a CRQC then we'd need an updated

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Russ Housley
Christian: > > Thanks. I am not 100% sure that we actually have an attack against the > [EC]DH+PSK combination, but I am confident than if the PSK secret is weak, > the attacker can get to the early data. If only for that, it is prudent to > use long enough PSK. As stated in

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Russ Housley
John: I respond to your three suggested changes below: (1) How about a title of "TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key" (2) None of the normative references are paywalled. Two references are not RFCs or RFC errata or I-Ds or IANA web pages:

Re: [TLS] Call to Move RFC 8773 from Experimental to Standards Track

2023-12-06 Thread Christian Huitema
On 12/6/2023 10:59 AM, Russ Housley wrote: Christian: Thanks. I am not 100% sure that we actually have an attack against the [EC]DH+PSK combination, but I am confident than if the PSK secret is weak, the attacker can get to the early data. If only for that, it is prudent to use long

Re: [TLS] [tlswg/rfc8447bis] Add text discouraging registration of code points from other WGs and RGs. (PR #50)

2023-12-06 Thread Salz, Rich
Well, my hope would be that given that these drafts are being effectively proposed for RG/WG adoption, the RG/WG chairs would help manage the situation once the experts flagged it. I believe most requests come in after adoption, but that’s based on my fallible memory. Perhaps it's better to