[TLS] I-D Action: draft-ietf-tls-dtls13-43.txt

2021-04-30 Thread internet-drafts


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Transport Layer Security WG of the IETF.

Title   : The Datagram Transport Layer Security (DTLS) Protocol 
Version 1.3
Authors : Eric Rescorla
  Hannes Tschofenig
  Nagendra Modadugu
Filename: draft-ietf-tls-dtls13-43.txt
Pages   : 71
Date: 2021-04-30

Abstract:
   This document specifies Version 1.3 of the Datagram Transport Layer
   Security (DTLS) protocol.  DTLS 1.3 allows client/server applications
   to communicate over the Internet in a way that is designed to prevent
   eavesdropping, tampering, and message forgery.

   The DTLS 1.3 protocol is intentionally based on the Transport Layer
   Security (TLS) 1.3 protocol and provides equivalent security
   guarantees with the exception of order protection/non-replayability.
   Datagram semantics of the underlying transport are preserved by the
   DTLS protocol.

   This document obsoletes RFC 6347.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-dtls13/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-tls-dtls13-43.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-tls-dtls13-43


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] [Uta] Recommending ALPN (was Re: [dns-privacy] Martin Duke's No Objection on draft-ietf-dprive-xfr-over-tls-11 ...)

2021-04-30 Thread Stephen Farrell


Hiya,

I like the text below as a starter. I'd suggest it also
include something to take into account the ECH issue
mentioned on the dpriv list [1]

S

[1] 
https://mailarchive.ietf.org/arch/msg/dns-privacy/3xL59_1P0ZHOUEYsDJ1Q22ZZVvo/


On 30/04/2021 07:46, Martin Thomson wrote:

On Fri, Apr 30, 2021, at 16:25, Valery Smyslov wrote:

The original motivation for 7525bis was to update RFC 7525 in light
of TLS 1.3 appearance. However, I believe that recommendations for
using ALPN are in scope of this document.


How about a new Section 3.7 "Application-Layer Protocol
Negotiation":

--- TLS implementations MUST support the Application-Layer Protocol
Negotiation (ALPN) extension [RFC7301].  Correct use of ALPN ensures
that clients and servers agree on a negotiated protocol.

Newly defined application protocols that use TLS MUST define an ALPN
identifier and mandate the use of ALPN for negotiating the protocol.

An existing application protocol might not have been assigned an ALPN
identifier.  For other protocols the ALPN identifier might not have
been part of the original protocol definition, or use of ALPN might
have been defined originally as being optional.  In all of these
cases, implementations cannot require the use of ALPN.  A server
implementation MUST fail a connection attempt with a fatal
"no_application_protocol" alert if it is configured to use a protocol
that has no assigned ALPN identifier and a client offers an
"application_layer_protocol_negotiation" extension. ---

This last bit might be an update to RFC 7301, but it's important for
protecting against cross-protocol attacks on clients that support
protocols with ALPN identifiers where the use of ALPN is not
guaranteed.

___ Uta mailing list 
u...@ietf.org https://www.ietf.org/mailman/listinfo/uta




OpenPGP_0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys


OpenPGP_signature
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] [Uta] Recommending ALPN (was Re: [dns-privacy] Martin Duke's No Objection on draft-ietf-dprive-xfr-over-tls-11 ...)

2021-04-30 Thread Martin Thomson
On Fri, Apr 30, 2021, at 16:25, Valery Smyslov wrote:
> The original motivation for 7525bis was to update RFC 7525 in light of 
> TLS 1.3 appearance.
> However, I believe that recommendations for using ALPN are in scope of 
> this document.

How about a new Section 3.7 "Application-Layer Protocol Negotiation":

---
TLS implementations MUST support the Application-Layer Protocol Negotiation 
(ALPN) extension [RFC7301].  Correct use of ALPN ensures that clients and 
servers agree on a negotiated protocol.

Newly defined application protocols that use TLS MUST define an ALPN identifier 
and mandate the use of ALPN for negotiating the protocol.

An existing application protocol might not have been assigned an ALPN 
identifier.  For other protocols the ALPN identifier might not have been part 
of the original protocol definition, or use of ALPN might have been defined 
originally as being optional.  In all of these cases, implementations cannot 
require the use of ALPN.  A server implementation MUST fail a connection 
attempt with a fatal "no_application_protocol" alert if it is configured to use 
a protocol that has no assigned ALPN identifier and a client offers an 
"application_layer_protocol_negotiation" extension.
---

This last bit might be an update to RFC 7301, but it's important for protecting 
against cross-protocol attacks on clients that support protocols with ALPN 
identifiers where the use of ALPN is not guaranteed.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] [Uta] Recommending ALPN (was Re: [dns-privacy] Martin Duke's No Objection on draft-ietf-dprive-xfr-over-tls-11 ...)

2021-04-30 Thread Valery Smyslov
Hi Martin,

> > >No new protocol should use TLS without ALPN.  It only opens space for 
> > > cross-protocol attacks.  Did the
> working group consider this possibility in their discussions?
> >
> > I don't believe that message has been made as public as it should be.
> 
> I see that UTA is working on a revision of RFC 7525.  Is text on this 
> something that would be in scope.  I only
> just searched for "ALPN", finding nothing, so maybe it is not in the original 
> scope and maybe there are things
> that might prevent expansion of scope.

The original motivation for 7525bis was to update RFC 7525 in light of TLS 1.3 
appearance.
However, I believe that recommendations for using ALPN are in scope of this 
document.

Regards,
Valery.

> ___
> Uta mailing list
> u...@ietf.org
> https://www.ietf.org/mailman/listinfo/uta

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls