
From nobody Sun Aug  1 05:48:11 2021
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA4823A39BF; Sun,  1 Aug 2021 05:48:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mH0l281gWdd9; Sun,  1 Aug 2021 05:47:58 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26FE63A39BD; Sun,  1 Aug 2021 05:47:57 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id C480E389B0; Sun,  1 Aug 2021 08:51:58 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id l8P5oi-YZO01; Sun,  1 Aug 2021 08:51:56 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 0CCE3389AD; Sun,  1 Aug 2021 08:51:56 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id E04F29CB; Sun,  1 Aug 2021 08:47:51 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Dirk-Willem van Gulik <dirkx@webweaving.org>, Eric Rescorla <ekr@rtfm.com>, IETF SecDispatch <secdispatch@ietf.org>, Henry Story <henry.story@gmail.com>, IETF SAAG <saag@ietf.org>
In-Reply-To: <66D90DC4-9BCF-4279-868E-61D5731EC2A4@webweaving.org>
References: <CAE1ny+4QdmSJS-spV6Do5yDs1x3iAwyHdSx=Oa+cRXU+ESZ2nA@mail.gmail.com> <CABcZeBO56B0YwEm5dbyp1=L_TN+EemoqGt6xDCPzMDRboDZVUw@mail.gmail.com> <7F5A47B0-4E26-4C51-AA21-6A6038A80A95@gmail.com> <CABcZeBNsjFaG9HZJ+0f3Czyikt3zpDkguveBh5id2rCHNNeAZg@mail.gmail.com> <66D90DC4-9BCF-4279-868E-61D5731EC2A4@webweaving.org>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Sun, 01 Aug 2021 08:47:51 -0400
Message-ID: <20104.1627822071@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/1kuVVDUirDzsVZ9PpEuLPLanfO8>
Subject: Re: [Secdispatch] [saag] Interest COVID-19 'passport' standardization?
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Aug 2021 12:48:03 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Dirk-Willem van Gulik <dirkx@webweaving.org> wrote:
    > So I think we have some useful lessons learned w.r.t. the importance =
of
    > off-line / totally local validation.

A quickly organized (rather open, live, virtual) IAB workshop (maybe combin=
ed with
W3C people) on lessons learned would be the best result in the short-term
(3 months) to me.

=2D-
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=C3=B8T consulti=
ng )
           Sandelman Software Works Inc, Ottawa and Worldwide





--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAmEGl/cACgkQgItw+93Q
3WV9pQf9GyWFGfrvZAtJz6AW/o2e+TJMg/VlwEIA8a0i1bPTxdhcS+APYMX8cvGx
YGWEhDFpZN0oa/8USoClRTIExHFu8wMxJ25B3fPUsO4NtQXwvVxoXGyiPkGT4/Eu
IDW0qgONZx8NH3BM2tK1ITpOna/JnX2S+2Zu1LerNvg0Yo33yGgBeaP1jT5Yvhws
XFlnRODuRwcIktaooWWtFwUC5dtzCRZuUl1hbllw0w0MAizyODzzDRbMnJsUIrC7
hK77PWieeZRT3WwloSBLn+cCkUSfniHheIlI6vyqNJItKNOST9SrXUTh3eZQjy2P
jO29/MfMDMXfo+HDf9Qi8SgySJP1Kw==
=7wji
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Wed Aug  4 10:02:23 2021
Return-Path: <ekr@rtfm.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98A403A0B91 for <secdispatch@ietfa.amsl.com>; Wed,  4 Aug 2021 10:02:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level: 
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UZq5SjI_ARfb for <secdispatch@ietfa.amsl.com>; Wed,  4 Aug 2021 10:02:17 -0700 (PDT)
Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com [IPv6:2a00:1450:4864:20::631]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D78E23A0B8C for <secdispatch@ietf.org>; Wed,  4 Aug 2021 10:02:16 -0700 (PDT)
Received: by mail-ej1-x631.google.com with SMTP id h9so4760311ejs.4 for <secdispatch@ietf.org>; Wed, 04 Aug 2021 10:02:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=jaumMmx2JPnGHgO1/uY1I3MtKdkMdQkuQsDX7PPaSPQ=; b=Abn5soifD3WCRLT2HjIyhB/elKlOo3p+I3AkXAyP0PZPMAGHpC4x3ToXvz84Z6Zz5q xU6W56DBNT/NHHoUHzYAcHRew9JUL7QafPevdtIw6OR8yZSJ0HewoGsjtewIh6QaRezi tHbvJUabB65DVV+PkwPE51YSB3dLLamdDZREmrjWa3xGX/6z9xaCGqIyj6hRUAlWO5kn Dgs2DqpA8ud1PYTyD9TV81PONXp4NDNWaPT/Sx4AxpEihDmeyk1MHzpnZb2U/xphVBlr GDXLG1wwUjxh0ll8lC3KimE1j9+lSVdVAQDZYy2n3eMydU8WOHtZypfL0JO9KbEj9CZZ QAfw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=jaumMmx2JPnGHgO1/uY1I3MtKdkMdQkuQsDX7PPaSPQ=; b=RBuwu4KorFKNWre+HRryA/XXCaXxl3cWdgFVZhNlaX5xuWDG5EqeMtOdv0PblZKWyk cNaJQKUyOdbErt7hFeiTabqes64YsJc7APKUU+2hA0uCWc5GIm3E5stme5WXGxKGQ0Ea LjfhnyCY8PPBzIZffs/A1QYtpQxRBCYn82v3tiSOSgbc1JoVjJuevsY4nC0Y7VH7IE+3 kxlKVZs+qt6qqQixHzcL1ouJ4mxmNz0VCa+7vgvIIzVsJOt14doCb66MHTGmoUdR40Pi 6OHzQT/Ruws0ho4I71USwGiWQts0zbqkWRX//NZQNMQ4ZFQ7sEU+7Y8HE3HZOBM67dkQ CzAQ==
X-Gm-Message-State: AOAM530mSfsrZj3KcM1mOxlibXYtuL42UqpJnVY5uv+Yobp2TRIY4irv 4024F/cD5/ZFLgA3AYFgu/ZBteRwLjgBNVBqvqVcJFNOlroPINOn
X-Google-Smtp-Source: ABdhPJxLosFn4TuAPJWK4eSVFS2d61Ywb7BZ73jK4F9rVuFotfrbCIq2uCwiZhNmF7cdC50funuCPiBhCvoVP9MBgvU=
X-Received: by 2002:a17:906:c7c2:: with SMTP id dc2mr202306ejb.472.1628096533580;  Wed, 04 Aug 2021 10:02:13 -0700 (PDT)
MIME-Version: 1.0
References: <E01AA1FF-B905-4635-9174-518294AFF2A2@trevilon.com>
In-Reply-To: <E01AA1FF-B905-4635-9174-518294AFF2A2@trevilon.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 4 Aug 2021 10:01:36 -0700
Message-ID: <CABcZeBNhD1KwndZhRB7Qvho6ubycu+6EbvOYBM1tp5gEM5crOg@mail.gmail.com>
To: Kenneth Vaughn <kvaughn@trevilon.com>
Cc: IETF SecDispatch <secdispatch@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008b67b905c8bec32c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/yIty68jNILMKDzxQaSBN8xp_Z3w>
Subject: Re: [Secdispatch] Requesting agenda time for draft-vaughn-tlstm-update
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 17:02:22 -0000

--0000000000008b67b905c8bec32c
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi folks,

I'm trying to follow the change in S 2.1 about the TLSTM fingerprint.

In TLS 1.2, one represented signature algorithms as:

      struct {
            HashAlgorithm hash;
            SignatureAlgorithm signature;
      } SignatureAndHashAlgorithm;

We found in TLS 1.3 that it was not really possible to mix-and-match
them and so changed this to a two-byte SignatureScheme that represented
the pair of hash and algorithm as well as any other values but without
any other internal structure. E.g.,

          rsa_pss_pss_sha256(0x0809),

As I understand it, 6353 used the TLS 1.2 HashAlgorithm identifier to
indicate which hash was used to make a fingerprint, and you're changing
this because TLS 1.3 deprecated this field? If so, I don't think this
is necessary: you're not referring to anything in TLS, you're just
reusing the code point. So, I would probably not make any change
here.

-Ekr





On Sun, Jun 27, 2021 at 7:31 PM Kenneth Vaughn <kvaughn@trevilon.com> wrote=
:

> I would like to present https://datatracker.ietf.org/doc/draft-vaughn-tls=
tm-update-01/, a new version of the proposed update of RFC 6353 (TLSTM). Ba=
sed on feedback from this group, and the recent IETF decision to finalize D=
TLS, the ITS community decided to keep support for DTLS in the update. The =
result of that decision was to reverse a number of changes in the text and =
it made more sense to write the proposed new version 01 as an update to RFC=
 6353 rather than a replacement of RFC 6353. The result is a shorter docume=
nt where the changes are more evident.
>
> I would like to request 10-15 minutes at IETF meeting of the Security Dis=
patch group to discuss the possibility of launching an effort to continue t=
he development of this document as an official IETF document.
>
> Regards,
> Ken Vaughn
>
> Trevilon LLC
> 6606 FM 1488 RD #148-503
> Magnolia, TX 77354
> +1-936-647-1910
> +1-571-331-5670 cell
> kvaughn@trevilon.com
> www.trevilon.com
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>

--0000000000008b67b905c8bec32c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi folks,<br><br>I&#39;m trying to follow the change in S =
2.1 about the TLSTM fingerprint.<br><br>In TLS 1.2, one represented signatu=
re algorithms as:<br><br>=C2=A0 =C2=A0 =C2=A0 struct {<br>=C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 HashAlgorithm hash;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 SignatureAlgorithm signature;<br>=C2=A0 =C2=A0 =C2=A0 } Sign=
atureAndHashAlgorithm;<br><br>We found in TLS 1.3 that it was not really po=
ssible to mix-and-match<br>them and so changed this to a two-byte Signature=
Scheme that represented<br>the pair of hash and algorithm as well as any ot=
her values but without<br>any other internal structure. E.g.,<br><br>=C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 rsa_pss_pss_sha256(0x0809),<br><br>As I unders=
tand it, 6353 used the TLS 1.2 HashAlgorithm identifier to<br>indicate whic=
h hash was used to make a fingerprint, and you&#39;re changing<br>this beca=
use TLS 1.3 deprecated this field? If so, I don&#39;t think this<br>is nece=
ssary: you&#39;re not referring to anything in TLS, you&#39;re just<br>reus=
ing the code point. So, I would probably not make any change<br>here.<br><b=
r>-Ekr<br><br><br><br><br></div><br><div class=3D"gmail_quote"><div dir=3D"=
ltr" class=3D"gmail_attr">On Sun, Jun 27, 2021 at 7:31 PM Kenneth Vaughn &l=
t;<a href=3D"mailto:kvaughn@trevilon.com">kvaughn@trevilon.com</a>&gt; wrot=
e:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div style=3D=
"overflow-wrap: break-word;"><div dir=3D"auto" style=3D"overflow-wrap: brea=
k-word;"><div dir=3D"auto" style=3D"overflow-wrap: break-word;"><div dir=3D=
"auto" style=3D"overflow-wrap: break-word;"><div dir=3D"auto" style=3D"over=
flow-wrap: break-word;"><pre style=3D"box-sizing:border-box;margin-top:0px;=
margin-bottom:1rem;overflow:auto;word-break:normal;padding:0px"><font face=
=3D"Arial"><font color=3D"#212529"><span style=3D"font-size:12.25px;white-s=
pace:pre-wrap">I would like to present <a href=3D"https://datatracker.ietf.=
org/doc/draft-vaughn-tlstm-update-01/" target=3D"_blank">https://datatracke=
r.ietf.org/doc/draft-vaughn-tlstm-update-01/</a>, a new version of the prop=
osed update of RFC 6353 (TLSTM).=C2=A0Based on feedback from this group, an=
d the recent IETF decision to finalize DTLS, the ITS community decided to k=
eep support for DTLS in the update. The result of that decision was to reve=
rse a number of changes in the text and it made more sense to write the pro=
posed new version 01 as</span></font></font><span style=3D"font-size:12.25p=
x;white-space:pre-wrap;color:rgb(33,37,41);font-family:Arial"> an update to=
 RFC 6353 rather than a replacement of RFC 6353. The result is a shorter do=
cument where the changes are more evident.</span></pre><pre style=3D"box-si=
zing:border-box;margin-top:0px;margin-bottom:1rem;overflow:auto;word-break:=
normal;padding:0px"><font face=3D"Arial"><font color=3D"#212529"><span styl=
e=3D"font-size:12.25px;white-space:pre-wrap">I would like to request 10-15 =
minutes at IETF meeting of the Security Dispatch group to discuss the possi=
bility of launching an effort to continue the development of this document =
as an official IETF document.</span></font></font></pre><div><div style=3D"=
color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;tex=
t-transform:none;white-space:normal;word-spacing:0px"><span style=3D"border=
-collapse:separate;font-family:Arial;font-variant-ligatures:normal;font-var=
iant-east-asian:normal;line-height:normal;border-spacing:0px"><div style=3D=
"overflow-wrap: break-word;"><span style=3D"border-collapse:separate;font-f=
amily:Arial;font-style:normal;font-variant-ligatures:normal;font-variant-ca=
ps:normal;font-variant-east-asian:normal;font-weight:normal;letter-spacing:=
normal;line-height:normal;text-indent:0px;text-transform:none;white-space:n=
ormal;word-spacing:0px;border-spacing:0px"><div style=3D"overflow-wrap: bre=
ak-word;"><span style=3D"border-collapse:separate;font-family:Arial;font-st=
yle:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-vari=
ant-east-asian:normal;letter-spacing:normal;line-height:normal;text-indent:=
0px;text-transform:none;white-space:normal;word-spacing:0px;border-spacing:=
0px"><div style=3D"overflow-wrap: break-word;"><span style=3D"border-collap=
se:separate;font-family:Arial;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-variant-east-asian:normal;letter-spacing:n=
ormal;line-height:normal;text-indent:0px;text-transform:none;white-space:no=
rmal;word-spacing:0px;border-spacing:0px"><div style=3D"overflow-wrap: brea=
k-word;"><span style=3D"border-collapse:separate;font-family:Arial;font-siz=
e:10px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:no=
rmal;font-variant-east-asian:normal;letter-spacing:normal;line-height:norma=
l;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;b=
order-spacing:0px"><div style=3D"color:rgb(0,0,0);font-weight:normal">Regar=
ds,</div><div style=3D"color:rgb(0,0,0);font-weight:normal">Ken Vaughn</div=
><div style=3D"color:rgb(0,0,0);font-weight:normal"><br></div><div style=3D=
"color:rgb(0,0,0);font-weight:normal">Trevilon LLC</div><div style=3D"color=
:rgb(0,0,0);font-weight:normal">6606 FM 1488 RD #148-503</div><div style=3D=
"color:rgb(0,0,0);font-weight:normal">Magnolia, TX 77354</div><div style=3D=
"color:rgb(0,0,0);font-weight:normal"><div>+1-936-647-1910</div><div>+1-571=
-331-5670 cell</div><div><a href=3D"mailto:kvaughn@trevilon.com" target=3D"=
_blank">kvaughn@trevilon.com</a></div><div><a href=3D"http://www.trevilon.c=
om" target=3D"_blank">www.trevilon.com</a></div></div></span></div></span><=
/div></span></div></span></div></span></div>
</div>
<br></div></div></div></div></div>_________________________________________=
______<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div>

--0000000000008b67b905c8bec32c--


From nobody Wed Aug  4 10:56:53 2021
Return-Path: <kvaughn@trevilon.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FDF03A0E30 for <secdispatch@ietfa.amsl.com>; Wed,  4 Aug 2021 10:56:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=trevilon.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hx1W-8BaSs_V for <secdispatch@ietfa.amsl.com>; Wed,  4 Aug 2021 10:56:46 -0700 (PDT)
Received: from tre.trevilon.com (tre.trevilon.com [198.57.226.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABDB33A0E29 for <secdispatch@ietf.org>; Wed,  4 Aug 2021 10:56:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=trevilon.com; s=default; h=References:To:Cc:In-Reply-To:Date:Subject: Mime-Version:Content-Type:Message-Id:From:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=5TqQmcnXOWtC7IzVpgGQiJ7vQGIUphCfZQvpUnrTWJ8=; b=jU+7nUp+tgcvgUhp47Mx/IvxNx LUQPFmQEplYfNX+CeXdAtAELakGm6iDgixC5Qk6fmgflbZ/Z8mF6PxMihBX+S0Kd9HnMe3XSjBLEn qDow3xreT+xML8GdkT8cSmJwl;
Received: from [92.119.18.40] (port=56453 helo=smtpclient.apple) by tre.trevilon.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <kvaughn@trevilon.com>) id 1mBL8H-0004Wt-2K; Wed, 04 Aug 2021 17:56:45 +0000
From: Kenneth Vaughn <kvaughn@trevilon.com>
Message-Id: <6CB9CF84-CF11-4386-A790-8FD9FCC0E0AD@trevilon.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_90F9FE0C-13BC-41D2-B22E-4007CF8C365F"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.22\))
Date: Wed, 4 Aug 2021 12:56:43 -0500
In-Reply-To: <CABcZeBNhD1KwndZhRB7Qvho6ubycu+6EbvOYBM1tp5gEM5crOg@mail.gmail.com>
Cc: IETF SecDispatch <secdispatch@ietf.org>
To: Eric Rescorla <ekr@rtfm.com>
References: <E01AA1FF-B905-4635-9174-518294AFF2A2@trevilon.com> <CABcZeBNhD1KwndZhRB7Qvho6ubycu+6EbvOYBM1tp5gEM5crOg@mail.gmail.com>
X-Mailer: Apple Mail (2.3654.100.0.2.22)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - tre.trevilon.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - trevilon.com
X-Get-Message-Sender-Via: tre.trevilon.com: authenticated_id: kvaughn@trevilon.com
X-Authenticated-Sender: tre.trevilon.com: kvaughn@trevilon.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/H2iScHVZlinvcWjGV3NfpfLfHcI>
Subject: Re: [Secdispatch] Requesting agenda time for draft-vaughn-tlstm-update
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 17:56:52 -0000

--Apple-Mail=_90F9FE0C-13BC-41D2-B22E-4007CF8C365F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Correct, TLS 1.2 provided separate one octet identifiers for the hash =
and signature algorithm. TLS 1.3 replaces the two identifiers with a =
single, two-octet cipher suite identifier that indicates a unique =
combination of hash and signature algorithm. The former method provided =
for 255 hash algorithms and 255 signature algorithms - apparently, it =
was determined that some combinations did not make sense so the values =
were combined - meaning all 65535 values can be assigned to meaningful =
combinations but also meaning that we can no longer assume that the =
first octet uniquely identifies the hash algorithm by itself.

If the IANA continues to maintain the TLS 1.2 hash algorithm registry, I =
agree that there could be an easier fix for RFC 6353; but there does not =
seem to be any guarantee at present that this will happen as TLS 1.2 =
ages. This results in two possible paths forward:

Option 1 is that we require the IANA to continue the maintenance of the =
1.2 registry AND we create an update to RFC 6353 that clarifies that the =
1.2 hash algorithm registry should still be used for the fingerprint, =
even when using TLS 1.3 (the update is needed as the mapping for 1.3 is =
ambiguous otherwise) OR=20

Option 2 is that we update RFC 6353 with a new fingerprint algorithm =
that uses the 1.3 registry (and then there is no additional requirement =
on IANA)


Our proposal was based on the concept that, if we are updating RFC 6353 =
anyway, we might as well decrease long-term maintenance issues for IANA =
(but recognizing that this is a bigger change on the standard and on =
implementations). But I agree that the work load could be shifted to =
IANA, which would simplify other issues. What is important is that we =
reach consensus on the approach to be followed and document the decision =
so that it is unambiguous. It's largely a question of who has to do the =
work.



Regards,
Ken Vaughn

Trevilon LLC
6606 FM 1488 RD #148-503
Magnolia, TX 77354
+1-936-647-1910
+1-571-331-5670 cell
kvaughn@trevilon.com
www.trevilon.com

> On Aug 4, 2021, at 12:01 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>=20
> Hi folks,
>=20
> I'm trying to follow the change in S 2.1 about the TLSTM fingerprint.
>=20
> In TLS 1.2, one represented signature algorithms as:
>=20
>       struct {
>             HashAlgorithm hash;
>             SignatureAlgorithm signature;
>       } SignatureAndHashAlgorithm;
>=20
> We found in TLS 1.3 that it was not really possible to mix-and-match
> them and so changed this to a two-byte SignatureScheme that =
represented
> the pair of hash and algorithm as well as any other values but without
> any other internal structure. E.g.,
>=20
>           rsa_pss_pss_sha256(0x0809),
>=20
> As I understand it, 6353 used the TLS 1.2 HashAlgorithm identifier to
> indicate which hash was used to make a fingerprint, and you're =
changing
> this because TLS 1.3 deprecated this field? If so, I don't think this
> is necessary: you're not referring to anything in TLS, you're just
> reusing the code point. So, I would probably not make any change
> here.
>=20
> -Ekr
>=20
>=20
>=20
>=20
>=20
> On Sun, Jun 27, 2021 at 7:31 PM Kenneth Vaughn <kvaughn@trevilon.com =
<mailto:kvaughn@trevilon.com>> wrote:
> I would like to present =
https://datatracker.ietf.org/doc/draft-vaughn-tlstm-update-01/ =
<https://datatracker.ietf.org/doc/draft-vaughn-tlstm-update-01/>, a new =
version of the proposed update of RFC 6353 (TLSTM). Based on feedback =
from this group, and the recent IETF decision to finalize DTLS, the ITS =
community decided to keep support for DTLS in the update. The result of =
that decision was to reverse a number of changes in the text and it made =
more sense to write the proposed new version 01 as an update to RFC 6353 =
rather than a replacement of RFC 6353. The result is a shorter document =
where the changes are more evident.
> I would like to request 10-15 minutes at IETF meeting of the Security =
Dispatch group to discuss the possibility of launching an effort to =
continue the development of this document as an official IETF document.
> Regards,
> Ken Vaughn
>=20
> Trevilon LLC
> 6606 FM 1488 RD #148-503
> Magnolia, TX 77354
> +1-936-647-1910
> +1-571-331-5670 cell
> kvaughn@trevilon.com <mailto:kvaughn@trevilon.com>
> www.trevilon.com <http://www.trevilon.com/>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org <mailto:Secdispatch@ietf.org>
> https://www.ietf.org/mailman/listinfo/secdispatch =
<https://www.ietf.org/mailman/listinfo/secdispatch>


--Apple-Mail=_90F9FE0C-13BC-41D2-B22E-4007CF8C365F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Correct, TLS 1.2 provided separate one octet identifiers for =
the hash and signature algorithm. TLS 1.3 replaces the two identifiers =
with a single, two-octet cipher suite identifier that indicates a unique =
combination of hash and signature algorithm. The former method provided =
for 255 hash algorithms and 255 signature algorithms - apparently, it =
was determined that some combinations did not make sense so the values =
were combined - meaning all 65535 values can be assigned to meaningful =
combinations but also meaning that we can no longer assume that the =
first octet uniquely identifies the hash algorithm by itself.</div><div =
class=3D""><br class=3D""></div>If the IANA continues to maintain the =
TLS 1.2 hash algorithm registry, I agree that there could be an easier =
fix for RFC 6353; but there does not seem to be any guarantee at present =
that this will happen as TLS 1.2 ages. This results in two possible =
paths forward:<br class=3D""><div class=3D""><br class=3D""></div><div =
class=3D"">Option 1 is that we require the IANA to continue the =
maintenance of the 1.2 registry AND we create an update to RFC 6353 that =
clarifies that the 1.2 hash algorithm registry should still be used for =
the fingerprint, even when using TLS 1.3 (the update is needed as the =
mapping for 1.3 is ambiguous otherwise) OR&nbsp;<br class=3D""><div =
class=3D""><br class=3D""></div><div class=3D"">Option 2 is that we =
update RFC 6353 with a new fingerprint algorithm that uses the 1.3 =
registry (and then there is no additional requirement on IANA)</div><div =
class=3D""><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">Our proposal was based on the concept that, if we are =
updating RFC 6353 anyway, we might as well decrease long-term =
maintenance issues for IANA (but recognizing that this is a bigger =
change on the standard and on implementations). But I agree that the =
work load could be shifted to IANA, which would simplify other issues. =
What is important is that we reach consensus on the approach to be =
followed and document the decision so that it is unambiguous. It's =
largely a question of who has to do the work.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""><div class=3D"">
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: =
break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D""><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; color: rgb(0, 0, 0); font-family: Arial; font-style: normal; =
font-variant-ligatures: normal; font-variant-caps: normal; =
font-variant-east-asian: normal; font-variant-position: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: =
none; white-space: normal; widows: 2; word-spacing: 0px; border-spacing: =
0px; -webkit-text-decorations-in-effect: none; =
-webkit-text-stroke-width: 0px;"><div style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><span=
 class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Arial; font-style: normal; font-variant-ligatures: normal; =
font-variant-caps: normal; font-variant-east-asian: normal; =
font-variant-position: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-align: -webkit-auto; =
text-indent: 0px; text-transform: none; white-space: normal; widows: 2; =
word-spacing: 0px; border-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-stroke-width: =
0px;"><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
line-break: after-white-space;" class=3D""><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Arial; font-style: normal; font-variant-ligatures: normal; =
font-variant-caps: normal; font-variant-east-asian: normal; =
font-variant-position: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
border-spacing: 0px; -webkit-text-decorations-in-effect: none; =
-webkit-text-stroke-width: 0px;"><div style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><span=
 class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Arial; font-style: normal; font-variant-ligatures: normal; =
font-variant-caps: normal; font-variant-east-asian: normal; =
font-variant-position: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
border-spacing: 0px; -webkit-text-decorations-in-effect: none; =
-webkit-text-stroke-width: 0px;"><div style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><span=
 class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Arial; font-size: 10px; font-style: normal; =
font-variant-ligatures: normal; font-variant-caps: normal; =
font-variant-east-asian: normal; font-variant-position: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; border-spacing: 0px; -webkit-text-decorations-in-effect: none; =
-webkit-text-stroke-width: 0px;"><div style=3D"color: rgb(0, 0, 0); =
font-weight: normal;" class=3D""><br =
class=3D"Apple-interchange-newline">Regards,</div><div style=3D"color: =
rgb(0, 0, 0); font-weight: normal;" class=3D"">Ken Vaughn</div><div =
style=3D"color: rgb(0, 0, 0); font-weight: normal;" class=3D""><br =
class=3D""></div><div style=3D"color: rgb(0, 0, 0); font-weight: =
normal;" class=3D"">Trevilon LLC</div><div style=3D"color: rgb(0, 0, 0); =
font-weight: normal;" class=3D"">6606 FM 1488 RD #148-503</div><div =
style=3D"color: rgb(0, 0, 0); font-weight: normal;" class=3D"">Magnolia, =
TX 77354</div><div style=3D"color: rgb(0, 0, 0); font-weight: normal;" =
class=3D""><div class=3D"">+1-936-647-1910</div><div =
class=3D"">+1-571-331-5670 cell</div><div class=3D""><a =
href=3D"mailto:kvaughn@trevilon.com" =
class=3D"">kvaughn@trevilon.com</a></div><div class=3D""><a =
href=3D"http://www.trevilon.com" =
class=3D"">www.trevilon.com</a></div></div></span></div></span></div></spa=
n></div></span></div></span></div>
</div>
<div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Aug 4, 2021, at 12:01 PM, Eric Rescorla &lt;<a =
href=3D"mailto:ekr@rtfm.com" class=3D"">ekr@rtfm.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
dir=3D"ltr" class=3D"">Hi folks,<br class=3D""><br class=3D"">I'm trying =
to follow the change in S 2.1 about the TLSTM fingerprint.<br =
class=3D""><br class=3D"">In TLS 1.2, one represented signature =
algorithms as:<br class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; struct =
{<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; HashAlgorithm =
hash;<br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
SignatureAlgorithm signature;<br class=3D"">&nbsp; &nbsp; &nbsp; } =
SignatureAndHashAlgorithm;<br class=3D""><br class=3D"">We found in TLS =
1.3 that it was not really possible to mix-and-match<br class=3D"">them =
and so changed this to a two-byte SignatureScheme that represented<br =
class=3D"">the pair of hash and algorithm as well as any other values =
but without<br class=3D"">any other internal structure. E.g.,<br =
class=3D""><br class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
rsa_pss_pss_sha256(0x0809),<br class=3D""><br class=3D"">As I understand =
it, 6353 used the TLS 1.2 HashAlgorithm identifier to<br =
class=3D"">indicate which hash was used to make a fingerprint, and =
you're changing<br class=3D"">this because TLS 1.3 deprecated this =
field? If so, I don't think this<br class=3D"">is necessary: you're not =
referring to anything in TLS, you're just<br class=3D"">reusing the code =
point. So, I would probably not make any change<br class=3D"">here.<br =
class=3D""><br class=3D"">-Ekr<br class=3D""><br class=3D""><br =
class=3D""><br class=3D""><br class=3D""></div><br class=3D""><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Sun, Jun =
27, 2021 at 7:31 PM Kenneth Vaughn &lt;<a =
href=3D"mailto:kvaughn@trevilon.com" =
class=3D"">kvaughn@trevilon.com</a>&gt; wrote:<br =
class=3D""></div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex"><div style=3D"overflow-wrap: =
break-word;" class=3D""><div dir=3D"auto" style=3D"overflow-wrap: =
break-word;" class=3D""><div dir=3D"auto" style=3D"overflow-wrap: =
break-word;" class=3D""><div dir=3D"auto" style=3D"overflow-wrap: =
break-word;" class=3D""><div dir=3D"auto" style=3D"overflow-wrap: =
break-word;" class=3D""><pre =
style=3D"box-sizing:border-box;margin-top:0px;margin-bottom:1rem;overflow:=
auto;word-break:normal;padding:0px" class=3D""><font face=3D"Arial" =
class=3D""><font color=3D"#212529" class=3D""><span =
style=3D"font-size:12.25px;white-space:pre-wrap" class=3D"">I would like =
to present <a =
href=3D"https://datatracker.ietf.org/doc/draft-vaughn-tlstm-update-01/" =
target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-vaughn-tlstm-update-01/<=
/a>, a new version of the proposed update of RFC 6353 =
(TLSTM).&nbsp;Based on feedback from this group, and the recent IETF =
decision to finalize DTLS, the ITS community decided to keep support for =
DTLS in the update. The result of that decision was to reverse a number =
of changes in the text and it made more sense to write the proposed new =
version 01 as</span></font></font><span =
style=3D"font-size:12.25px;white-space:pre-wrap;color:rgb(33,37,41);font-f=
amily:Arial" class=3D""> an update to RFC 6353 rather than a replacement =
of RFC 6353. The result is a shorter document where the changes are more =
evident.</span></pre><pre =
style=3D"box-sizing:border-box;margin-top:0px;margin-bottom:1rem;overflow:=
auto;word-break:normal;padding:0px" class=3D""><font face=3D"Arial" =
class=3D""><font color=3D"#212529" class=3D""><span =
style=3D"font-size:12.25px;white-space:pre-wrap" class=3D"">I would like =
to request 10-15 minutes at IETF meeting of the Security Dispatch group =
to discuss the possibility of launching an effort to continue the =
development of this document as an official IETF =
document.</span></font></font></pre><div class=3D""><div =
style=3D"letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px;" =
class=3D""><span =
style=3D"border-collapse:separate;font-family:Arial;font-variant-ligatures=
:normal;font-variant-east-asian:normal;line-height:normal;border-spacing:0=
px" class=3D""><div style=3D"overflow-wrap: break-word;" class=3D""><span =
style=3D"border-collapse:separate;font-family:Arial;font-style:normal;font=
-variant-ligatures:normal;font-variant-caps:normal;font-variant-east-asian=
:normal;font-weight:normal;letter-spacing:normal;line-height:normal;text-i=
ndent:0px;text-transform:none;white-space:normal;word-spacing:0px;border-s=
pacing:0px" class=3D""><div style=3D"overflow-wrap: break-word;" =
class=3D""><span =
style=3D"border-collapse:separate;font-family:Arial;font-style:normal;font=
-variant-ligatures:normal;font-variant-caps:normal;font-variant-east-asian=
:normal;letter-spacing:normal;line-height:normal;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;border-spacing:0px" =
class=3D""><div style=3D"overflow-wrap: break-word;" class=3D""><span =
style=3D"border-collapse:separate;font-family:Arial;font-style:normal;font=
-variant-ligatures:normal;font-variant-caps:normal;font-variant-east-asian=
:normal;letter-spacing:normal;line-height:normal;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;border-spacing:0px" =
class=3D""><div style=3D"overflow-wrap: break-word;" class=3D""><span =
style=3D"border-collapse:separate;font-family:Arial;font-size:10px;font-st=
yle:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-var=
iant-east-asian:normal;letter-spacing:normal;line-height:normal;text-inden=
t:0px;text-transform:none;white-space:normal;word-spacing:0px;border-spaci=
ng:0px" class=3D""><div style=3D"font-weight: normal;" =
class=3D"">Regards,</div><div style=3D"font-weight: normal;" =
class=3D"">Ken Vaughn</div><div style=3D"font-weight: normal;" =
class=3D""><br class=3D""></div><div style=3D"font-weight: normal;" =
class=3D"">Trevilon LLC</div><div style=3D"font-weight: normal;" =
class=3D"">6606 FM 1488 RD #148-503</div><div style=3D"font-weight: =
normal;" class=3D"">Magnolia, TX 77354</div><div style=3D"font-weight: =
normal;" class=3D""><div class=3D"">+1-936-647-1910</div><div =
class=3D"">+1-571-331-5670 cell</div><div class=3D""><a =
href=3D"mailto:kvaughn@trevilon.com" target=3D"_blank" =
class=3D"">kvaughn@trevilon.com</a></div><div class=3D""><a =
href=3D"http://www.trevilon.com/" target=3D"_blank" =
class=3D"">www.trevilon.com</a></div></div></span></div></span></div></spa=
n></div></span></div></span></div>
</div>
<br =
class=3D""></div></div></div></div></div>_________________________________=
______________<br class=3D"">
Secdispatch mailing list<br class=3D"">
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank" =
class=3D"">Secdispatch@ietf.org</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/secdispatch</a><br =
class=3D"">
</blockquote></div>
</div></blockquote></div><br class=3D""></div></div></body></html>=

--Apple-Mail=_90F9FE0C-13BC-41D2-B22E-4007CF8C365F--


From nobody Wed Aug  4 11:04:58 2021
Return-Path: <ekr@rtfm.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2D5F3A0E96 for <secdispatch@ietfa.amsl.com>; Wed,  4 Aug 2021 11:04:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level: 
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yIvPzSxdPTW8 for <secdispatch@ietfa.amsl.com>; Wed,  4 Aug 2021 11:04:51 -0700 (PDT)
Received: from mail-io1-xd2c.google.com (mail-io1-xd2c.google.com [IPv6:2607:f8b0:4864:20::d2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DDCA3A0E90 for <secdispatch@ietf.org>; Wed,  4 Aug 2021 11:04:51 -0700 (PDT)
Received: by mail-io1-xd2c.google.com with SMTP id f6so3445211ioc.6 for <secdispatch@ietf.org>; Wed, 04 Aug 2021 11:04:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sMQKqOGx3z1Mi+c6WV8SInTeFD3rB4uqMZWe/h32ydo=; b=W1iFFetdX+tWp0YpxhFLiR11JC6uMotwsL5Dst/RpSDgXVOszVqkfShfedGAQIXopH 2p4+PVqOG59LMZej7M79oyvhhKHXs+Ix2ci5PpUz1rrib3uIfBhsXBzKz9t2Dh6wFEuB jgq2WfCTvQ4HYF+UMqcGtUhiHCasguscdTwdZHlskgnXQ6Dj7wb6/t3seM97xpGH26ky 0j5CXIsjQFVjib4lQ2TFBKW387Nj4UjfU77vhDlVKc5ntuyv3foghagljrMDYmpIewtG N5LKFdoKe6XW5cAsoEIUp/M0h1oj4+64Rk0DzT49fOt6c2PAOWEMMAE7usA0wBD0KgDN zZVQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sMQKqOGx3z1Mi+c6WV8SInTeFD3rB4uqMZWe/h32ydo=; b=dblUf0N49itupeoo06RfI9ce0RHWI4l3YfVpbPDMzGwGLjAB69rzNHM0Ox/UEN2Hqu CCHqO6EU2/GmQ2MZr3G3cYw4u899puwH3j5sjnPvX7z7mCVc4sfh5Gt0mM3T8DJwvfYM eZA7L+twjc/NErkax7qeUZjrdoWRGcd5nPybs3roJd9OoqhPfwl9KP4mFDEuYdEBiZM7 iYDaVZJXMaTPNMouKq2rCUraTo8wjynaSAZO4hYmpKCfLSAWgET1okcliUDSriAAJIh8 xkWuM/WzK1eR5htq5LiFCQjIj9PYFdGJZdUr4SnFq9PW1X3IR4wMxvC7zT84rytTyWff tVTA==
X-Gm-Message-State: AOAM530A1TDABgki7USnZ/LKLle46Lk/nRl/WCFaHhY9tKiiJjaEfr6r yZKCXyrR9Go9VImo5a3ILjJWLZGKz8QjgI5z6X1XYQ==
X-Google-Smtp-Source: ABdhPJwvN5gGYayqe/kpNa6NaxL3UjQBFgqW4kcd54KTG7tTYbiMyPKm3NJTU/vfpjdJLMDsioUVjHvLNN1DUbNHVgk=
X-Received: by 2002:a05:6638:338f:: with SMTP id h15mr632339jav.135.1628100289228;  Wed, 04 Aug 2021 11:04:49 -0700 (PDT)
MIME-Version: 1.0
References: <E01AA1FF-B905-4635-9174-518294AFF2A2@trevilon.com> <CABcZeBNhD1KwndZhRB7Qvho6ubycu+6EbvOYBM1tp5gEM5crOg@mail.gmail.com> <6CB9CF84-CF11-4386-A790-8FD9FCC0E0AD@trevilon.com>
In-Reply-To: <6CB9CF84-CF11-4386-A790-8FD9FCC0E0AD@trevilon.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 4 Aug 2021 11:04:13 -0700
Message-ID: <CABcZeBNUDDmhkQ0ymfX5zQbzYHomL6iKY1BL44ojk2yNe958Tg@mail.gmail.com>
To: Kenneth Vaughn <kvaughn@trevilon.com>
Cc: IETF SecDispatch <secdispatch@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000660c8f05c8bfa3b6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/xcFNlkhn5Qj0M0HeT6OfyeXufGI>
Subject: Re: [Secdispatch] Requesting agenda time for draft-vaughn-tlstm-update
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 18:04:57 -0000

--000000000000660c8f05c8bfa3b6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Wed, Aug 4, 2021 at 10:56 AM Kenneth Vaughn <kvaughn@trevilon.com> wrote=
:

> Correct, TLS 1.2 provided separate one octet identifiers for the hash and
> signature algorithm. TLS 1.3 replaces the two identifiers with a single,
> two-octet cipher suite identifier that indicates a unique combination of
> hash and signature algorithm.
>

Just to clarify, this is not a "cipher suite" but rather a "signature
scheme". TLS cipher suites consist of the pair of AEAD and hash algorithms.


The former method provided for 255 hash algorithms and 255 signature
> algorithms - apparently, it was determined that some combinations did not
> make sense so the values were combined - meaning all 65535 values can be
> assigned to meaningful combinations but also meaning that we can no longe=
r
> assume that the first octet uniquely identifies the hash algorithm by
> itself.
>

Yes, that's correct.


If the IANA continues to maintain the TLS 1.2 hash algorithm registry, I
> agree that there could be an easier fix for RFC 6353; but there does not
> seem to be any guarantee at present that this will happen as TLS 1.2 ages=
.
> This results in two possible paths forward:
>
> Option 1 is that we require the IANA to continue the maintenance of the
> 1.2 registry AND we create an update to RFC 6353 that clarifies that the
> 1.2 hash algorithm registry should still be used for the fingerprint, eve=
n
> when using TLS 1.3 (the update is needed as the mapping for 1.3 is
> ambiguous otherwise) OR
>

I don't understand this point. There's no dependency here on TLS 1.3 at
all. You're just using the registry. In fact, nothing stops you from using
hash algorithms which TLS 1.3 doesn't support at all.

Option 2 is that we update RFC 6353 with a new fingerprint algorithm that
> uses the 1.3 registry (and then there is no additional requirement on IAN=
A)
>

I don't see how you can use either of the TLS 1.3 registries that include
hashes (signature scheme or cipher suite) as both have multiple entries for
the same hash algorithm (e.g., RSA and ECDSA with SHA-256, AES_128_GCM and
Chacha20Poly1305 with SHA-256). This is going to create an enormous amount
of confusion.


> Our proposal was based on the concept that, if we are updating RFC 6353
> anyway, we might as well decrease long-term maintenance issues for IANA
> (but recognizing that this is a bigger change on the standard and on
> implementations). But I agree that the work load could be shifted to IANA=
,
> which would simplify other issues. What is important is that we reach
> consensus on the approach to be followed and document the decision so tha=
t
> it is unambiguous. It's largely a question of who has to do the work.
>

I don't think continuing to maintain this registry will constitute an
appreciable amount of work for IANA. However, you could also just clone the
registry.

-Ekr


>
>
> Regards,
> Ken Vaughn
>
> Trevilon LLC
> 6606 FM 1488 RD #148-503
> Magnolia, TX 77354
> +1-936-647-1910
> +1-571-331-5670 cell
> kvaughn@trevilon.com
> www.trevilon.com
>
> On Aug 4, 2021, at 12:01 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>
> Hi folks,
>
> I'm trying to follow the change in S 2.1 about the TLSTM fingerprint.
>
> In TLS 1.2, one represented signature algorithms as:
>
>       struct {
>             HashAlgorithm hash;
>             SignatureAlgorithm signature;
>       } SignatureAndHashAlgorithm;
>
> We found in TLS 1.3 that it was not really possible to mix-and-match
> them and so changed this to a two-byte SignatureScheme that represented
> the pair of hash and algorithm as well as any other values but without
> any other internal structure. E.g.,
>
>           rsa_pss_pss_sha256(0x0809),
>
> As I understand it, 6353 used the TLS 1.2 HashAlgorithm identifier to
> indicate which hash was used to make a fingerprint, and you're changing
> this because TLS 1.3 deprecated this field? If so, I don't think this
> is necessary: you're not referring to anything in TLS, you're just
> reusing the code point. So, I would probably not make any change
> here.
>
> -Ekr
>
>
>
>
>
> On Sun, Jun 27, 2021 at 7:31 PM Kenneth Vaughn <kvaughn@trevilon.com>
> wrote:
>
>> I would like to present https://datatracker.ietf.org/doc/draft-vaughn-tl=
stm-update-01/, a new version of the proposed update of RFC 6353 (TLSTM). B=
ased on feedback from this group, and the recent IETF decision to finalize =
DTLS, the ITS community decided to keep support for DTLS in the update. The=
 result of that decision was to reverse a number of changes in the text and=
 it made more sense to write the proposed new version 01 as an update to RF=
C 6353 rather than a replacement of RFC 6353. The result is a shorter docum=
ent where the changes are more evident.
>>
>> I would like to request 10-15 minutes at IETF meeting of the Security Di=
spatch group to discuss the possibility of launching an effort to continue =
the development of this document as an official IETF document.
>>
>> Regards,
>> Ken Vaughn
>>
>> Trevilon LLC
>> 6606 FM 1488 RD #148-503
>> Magnolia, TX 77354
>> +1-936-647-1910
>> +1-571-331-5670 cell
>> kvaughn@trevilon.com
>> www.trevilon.com
>>
>> _______________________________________________
>> Secdispatch mailing list
>> Secdispatch@ietf.org
>> https://www.ietf.org/mailman/listinfo/secdispatch
>>
>
>

--000000000000660c8f05c8bfa3b6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Wed, Aug 4, 2021 at 10:56 AM Kenne=
th Vaughn &lt;<a href=3D"mailto:kvaughn@trevilon.com">kvaughn@trevilon.com<=
/a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><=
div style=3D"overflow-wrap: break-word;"><div>Correct, TLS 1.2 provided sep=
arate one octet identifiers for the hash and signature algorithm. TLS 1.3 r=
eplaces the two identifiers with a single, two-octet cipher suite identifie=
r that indicates a unique combination of hash and signature algorithm. </di=
v></div></blockquote><div><br></div><div>Just to clarify, this is not a &qu=
ot;cipher suite&quot; but rather a &quot;signature scheme&quot;. TLS cipher=
 suites consist of the pair of AEAD and hash algorithms.</div><div><br></di=
v><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div sty=
le=3D"overflow-wrap: break-word;"><div>The former method provided for 255 h=
ash algorithms and 255 signature algorithms - apparently, it was determined=
 that some combinations did not make sense so the values were combined - me=
aning all 65535 values can be assigned to meaningful combinations but also =
meaning that we can no longer assume that the first octet uniquely identifi=
es the hash algorithm by itself.</div></div></blockquote><div><br></div><di=
v>Yes, that&#39;s correct.</div><div><br> </div><div><br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px sol=
id rgb(204,204,204);padding-left:1ex"><div style=3D"overflow-wrap: break-wo=
rd;">If the IANA continues to maintain the TLS 1.2 hash algorithm registry,=
 I agree that there could be an easier fix for RFC 6353; but there does not=
 seem to be any guarantee at present that this will happen as TLS 1.2 ages.=
 This results in two possible paths forward:<br><div><br></div><div>Option =
1 is that we require the IANA to continue the maintenance of the 1.2 regist=
ry AND we create an update to RFC 6353 that clarifies that the 1.2 hash alg=
orithm registry should still be used for the fingerprint, even when using T=
LS 1.3 (the update is needed as the mapping for 1.3 is ambiguous otherwise)=
 OR=C2=A0<br></div></div></blockquote><div><br></div><div>I don&#39;t under=
stand this point. There&#39;s no dependency here on TLS 1.3 at all. You&#39=
;re just using the registry. In fact, nothing stops you from using hash alg=
orithms which TLS 1.3 doesn&#39;t support at all.<br></div><div><br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l=
eft:1px solid rgb(204,204,204);padding-left:1ex"><div style=3D"overflow-wra=
p: break-word;"><div><div>Option 2 is that we update RFC 6353 with a new fi=
ngerprint algorithm that uses the 1.3 registry (and then there is no additi=
onal requirement on IANA)</div></div></div></blockquote><div><br></div><div=
>I don&#39;t see how you can use either of the TLS 1.3 registries that incl=
ude hashes (signature scheme or cipher suite) as both have multiple entries=
 for the same hash algorithm (e.g., RSA and ECDSA with SHA-256, AES_128_GCM=
 and Chacha20Poly1305 with SHA-256). This is going to create an enormous am=
ount of confusion.</div><div><br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padd=
ing-left:1ex"><div style=3D"overflow-wrap: break-word;"><div><div><br></div=
><div>Our proposal was based on the concept that, if we are updating RFC 63=
53 anyway, we might as well decrease long-term maintenance issues for IANA =
(but recognizing that this is a bigger change on the standard and on implem=
entations). But I agree that the work load could be shifted to IANA, which =
would simplify other issues. What is important is that we reach consensus o=
n the approach to be followed and document the decision so that it is unamb=
iguous. It&#39;s largely a question of who has to do the work.</div></div><=
/div></blockquote><div><br></div><div>I don&#39;t think continuing to maint=
ain this registry will constitute an appreciable amount of work for IANA. H=
owever, you could also just clone the registry.</div><div><br></div><div>-E=
kr</div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><d=
iv style=3D"overflow-wrap: break-word;"><div><div><br></div><div><br><div>
<div style=3D"color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-=
indent:0px;text-transform:none;white-space:normal;word-spacing:0px"><span s=
tyle=3D"border-collapse:separate;color:rgb(0,0,0);font-family:Arial;font-st=
yle:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-vari=
ant-east-asian:normal;font-weight:normal;letter-spacing:normal;line-height:=
normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:=
0px;border-spacing:0px"><div style=3D"overflow-wrap: break-word;"><span sty=
le=3D"border-collapse:separate;font-family:Arial;font-style:normal;font-var=
iant-ligatures:normal;font-variant-caps:normal;font-variant-east-asian:norm=
al;font-weight:normal;letter-spacing:normal;line-height:normal;text-indent:=
0px;text-transform:none;white-space:normal;word-spacing:0px;border-spacing:=
0px"><div style=3D"overflow-wrap: break-word;"><span style=3D"border-collap=
se:separate;font-family:Arial;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-variant-east-asian:normal;letter-spacing:n=
ormal;line-height:normal;text-indent:0px;text-transform:none;white-space:no=
rmal;word-spacing:0px;border-spacing:0px"><div style=3D"overflow-wrap: brea=
k-word;"><span style=3D"border-collapse:separate;font-family:Arial;font-sty=
le:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-varia=
nt-east-asian:normal;letter-spacing:normal;line-height:normal;text-indent:0=
px;text-transform:none;white-space:normal;word-spacing:0px;border-spacing:0=
px"><div style=3D"overflow-wrap: break-word;"><span style=3D"border-collaps=
e:separate;font-family:Arial;font-size:10px;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-variant-east-asian:normal;le=
tter-spacing:normal;line-height:normal;text-indent:0px;text-transform:none;=
white-space:normal;word-spacing:0px;border-spacing:0px"><div style=3D"color=
:rgb(0,0,0);font-weight:normal"><br>Regards,</div><div style=3D"color:rgb(0=
,0,0);font-weight:normal">Ken Vaughn</div><div style=3D"color:rgb(0,0,0);fo=
nt-weight:normal"><br></div><div style=3D"color:rgb(0,0,0);font-weight:norm=
al">Trevilon LLC</div><div style=3D"color:rgb(0,0,0);font-weight:normal">66=
06 FM 1488 RD #148-503</div><div style=3D"color:rgb(0,0,0);font-weight:norm=
al">Magnolia, TX 77354</div><div style=3D"color:rgb(0,0,0);font-weight:norm=
al"><div>+1-936-647-1910</div><div>+1-571-331-5670 cell</div><div><a href=
=3D"mailto:kvaughn@trevilon.com" target=3D"_blank">kvaughn@trevilon.com</a>=
</div><div><a href=3D"http://www.trevilon.com" target=3D"_blank">www.trevil=
on.com</a></div></div></span></div></span></div></span></div></span></div><=
/span></div>
</div>
<div><br><blockquote type=3D"cite"><div>On Aug 4, 2021, at 12:01 PM, Eric R=
escorla &lt;<a href=3D"mailto:ekr@rtfm.com" target=3D"_blank">ekr@rtfm.com<=
/a>&gt; wrote:</div><br><div><div dir=3D"ltr">Hi folks,<br><br>I&#39;m tryi=
ng to follow the change in S 2.1 about the TLSTM fingerprint.<br><br>In TLS=
 1.2, one represented signature algorithms as:<br><br>=C2=A0 =C2=A0 =C2=A0 =
struct {<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 HashAlgorithm hash;<b=
r>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 SignatureAlgorithm signature;<b=
r>=C2=A0 =C2=A0 =C2=A0 } SignatureAndHashAlgorithm;<br><br>We found in TLS =
1.3 that it was not really possible to mix-and-match<br>them and so changed=
 this to a two-byte SignatureScheme that represented<br>the pair of hash an=
d algorithm as well as any other values but without<br>any other internal s=
tructure. E.g.,<br><br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 rsa_pss_pss_sha25=
6(0x0809),<br><br>As I understand it, 6353 used the TLS 1.2 HashAlgorithm i=
dentifier to<br>indicate which hash was used to make a fingerprint, and you=
&#39;re changing<br>this because TLS 1.3 deprecated this field? If so, I do=
n&#39;t think this<br>is necessary: you&#39;re not referring to anything in=
 TLS, you&#39;re just<br>reusing the code point. So, I would probably not m=
ake any change<br>here.<br><br>-Ekr<br><br><br><br><br></div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Sun, Jun 27, 2021=
 at 7:31 PM Kenneth Vaughn &lt;<a href=3D"mailto:kvaughn@trevilon.com" targ=
et=3D"_blank">kvaughn@trevilon.com</a>&gt; wrote:<br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid r=
gb(204,204,204);padding-left:1ex"><div><div dir=3D"auto"><div dir=3D"auto">=
<div dir=3D"auto"><div dir=3D"auto"><pre style=3D"box-sizing:border-box;mar=
gin-top:0px;margin-bottom:1rem;overflow:auto;word-break:normal;padding:0px"=
><font face=3D"Arial"><font color=3D"#212529"><span style=3D"font-size:12.2=
5px;white-space:pre-wrap">I would like to present <a href=3D"https://datatr=
acker.ietf.org/doc/draft-vaughn-tlstm-update-01/" target=3D"_blank">https:/=
/datatracker.ietf.org/doc/draft-vaughn-tlstm-update-01/</a>, a new version =
of the proposed update of RFC 6353 (TLSTM).=C2=A0Based on feedback from thi=
s group, and the recent IETF decision to finalize DTLS, the ITS community d=
ecided to keep support for DTLS in the update. The result of that decision =
was to reverse a number of changes in the text and it made more sense to wr=
ite the proposed new version 01 as</span></font></font><span style=3D"font-=
size:12.25px;white-space:pre-wrap;color:rgb(33,37,41);font-family:Arial"> a=
n update to RFC 6353 rather than a replacement of RFC 6353. The result is a=
 shorter document where the changes are more evident.</span></pre><pre styl=
e=3D"box-sizing:border-box;margin-top:0px;margin-bottom:1rem;overflow:auto;=
word-break:normal;padding:0px"><font face=3D"Arial"><font color=3D"#212529"=
><span style=3D"font-size:12.25px;white-space:pre-wrap">I would like to req=
uest 10-15 minutes at IETF meeting of the Security Dispatch group to discus=
s the possibility of launching an effort to continue the development of thi=
s document as an official IETF document.</span></font></font></pre><div><di=
v style=3D"letter-spacing:normal;text-align:start;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px"><span style=3D"border-colla=
pse:separate;font-family:Arial;font-variant-ligatures:normal;font-variant-e=
ast-asian:normal;line-height:normal;border-spacing:0px"><div><span style=3D=
"border-collapse:separate;font-family:Arial;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-variant-east-asian:normal;fo=
nt-weight:normal;letter-spacing:normal;line-height:normal;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;border-spacing:0px">=
<div><span style=3D"border-collapse:separate;font-family:Arial;font-style:n=
ormal;font-variant-ligatures:normal;font-variant-caps:normal;font-variant-e=
ast-asian:normal;letter-spacing:normal;line-height:normal;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;border-spacing:0px">=
<div><span style=3D"border-collapse:separate;font-family:Arial;font-style:n=
ormal;font-variant-ligatures:normal;font-variant-caps:normal;font-variant-e=
ast-asian:normal;letter-spacing:normal;line-height:normal;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;border-spacing:0px">=
<div><span style=3D"border-collapse:separate;font-family:Arial;font-size:10=
px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal=
;font-variant-east-asian:normal;letter-spacing:normal;line-height:normal;te=
xt-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;borde=
r-spacing:0px"><div style=3D"font-weight:normal">Regards,</div><div style=
=3D"font-weight:normal">Ken Vaughn</div><div style=3D"font-weight:normal"><=
br></div><div style=3D"font-weight:normal">Trevilon LLC</div><div style=3D"=
font-weight:normal">6606 FM 1488 RD #148-503</div><div style=3D"font-weight=
:normal">Magnolia, TX 77354</div><div style=3D"font-weight:normal"><div>+1-=
936-647-1910</div><div>+1-571-331-5670 cell</div><div><a href=3D"mailto:kva=
ughn@trevilon.com" target=3D"_blank">kvaughn@trevilon.com</a></div><div><a =
href=3D"http://www.trevilon.com/" target=3D"_blank">www.trevilon.com</a></d=
iv></div></span></div></span></div></span></div></span></div></span></div>
</div>
<br></div></div></div></div></div>_________________________________________=
______<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div>
</div></blockquote></div><br></div></div></div></blockquote></div></div>

--000000000000660c8f05c8bfa3b6--


From nobody Fri Aug  6 16:44:44 2021
Return-Path: <krose@krose.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 394DF3A1EA6 for <secdispatch@ietfa.amsl.com>; Fri,  6 Aug 2021 16:44:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=krose.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aB6Ktaa77--N for <secdispatch@ietfa.amsl.com>; Fri,  6 Aug 2021 16:44:36 -0700 (PDT)
Received: from mail-wr1-x42f.google.com (mail-wr1-x42f.google.com [IPv6:2a00:1450:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C8803A1EA3 for <secdispatch@ietf.org>; Fri,  6 Aug 2021 16:44:36 -0700 (PDT)
Received: by mail-wr1-x42f.google.com with SMTP id c9so12967189wri.8 for <secdispatch@ietf.org>; Fri, 06 Aug 2021 16:44:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=krose.org; s=google; h=mime-version:from:date:message-id:subject:to:cc; bh=dZCVaWlR3bbmfSedwhgxxCetA7NGhMU9/64Bv3j4/0w=; b=Y+Z8yFBkP71+bBh/8V/VEHZSxMFefBax0sShFyI/J0y6jjToh01GGF/QvCbI5kATXt xSGyIuA7tnjvYaqGZ0JyrfiQSlbP0jrmvtq88W/eyHgaO4dWh4oyvMEoCu/RT3OL5Xce VXc0+hXv0sUrn0M+bNfowMdFIhtGfWdhDOOTE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=dZCVaWlR3bbmfSedwhgxxCetA7NGhMU9/64Bv3j4/0w=; b=jYSQ7A6VVJbpEwrBfR9Njv8Ivdrv8PQKSRReY3gFkmNE7outxIxdX3+2+f19XMPW/g fGSyOnuac4jDswVT0FrAZxKshtvsbyq2hHiG2DJx4fvrTbG3hXnuKxM3lH54QNOQgutf hWOWlqLQ9FzJ2Ev3HtkAdULWUnRcbWOwH9HmypiIwM2eOI/KRoKJ6cKKC7PuGCs1Tvp5 reCVCrO/VfuUJurDUhA6wH9ZtlEkCR42rZg+tkWP47nYYwLicydsUfccpMU7EhqyqSFl yBvdXSmBgkllB45omtYG+NYdjT99CRlmLFndCj49lAIr3Vvw6RCfug7yeJXD5M9FtERX UjTQ==
X-Gm-Message-State: AOAM531d0nHqSaw/y3GCM1wM9Qn13YUR8DWPREOlTHpIADbK+cLV2XQg s8MZqxZzqE1xWp9VYjU1U0hU7j5H9nAjbwOWTpYdWd63bQY=
X-Google-Smtp-Source: ABdhPJxoheD2P+/oJEoctGM9nPkpklwcEJIkT/cBAJK0xXyoA8jIzLgW5eYA6n3g4649KgZTbJwiVcDjVwhHdEzPZcU=
X-Received: by 2002:adf:cd92:: with SMTP id q18mr13425956wrj.18.1628293472726;  Fri, 06 Aug 2021 16:44:32 -0700 (PDT)
MIME-Version: 1.0
From: Kyle Rose <krose@krose.org>
Date: Fri, 6 Aug 2021 19:44:21 -0400
Message-ID: <CAJU8_nWZQSQdv7D8OKdGiq-gc65+F5bbMFzX2mvfHxfmhff+Cw@mail.gmail.com>
To: secdispatch@ietf.org
Cc: Jake Holland <jakeholland.net@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000083cf605c8ec9ec8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/LRMHRKiHfk3vgV43KRbG31x-y4I>
Subject: [Secdispatch] Multicast Security and Privacy Considerations
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Aug 2021 23:44:42 -0000

--000000000000083cf605c8ec9ec8
Content-Type: text/plain; charset="UTF-8"

Secdispatch participants:

Across two SDOs (IETF and W3C), multiple parties have begun to look into
how to make multicast safe within the Web security model. As part of this
effort, Jake Holland and I have been putting together a security and
privacy considerations document for multicast, akin to that for WebRTC (RFC
8826), that attempts to identify where multicast inherently differs from
unicast in usage patterns and protocol constraints, and then lays out a set
of requirements for multicast protocols that we believe would allow them to
fit within the spirit of the Web security model. From the abstract:

> Interdomain multicast has unique potential to solve delivery scalability
for popular content, but it carries a set of security and privacy issues
that differ from those in unicast delivery. This document analyzes the
security threats unique to multicast-based delivery for Internet and Web
traffic under the Internet and Web threat models.

We come to secdispatch primarily with the aim of finding a venue within the
IETF in which to continue to flesh out and improve this work. Considering
the potential security and privacy implications for browsers of introducing
a model for content delivery that in many ways fundamentally differs from
that provided by existing unicast transports, we are especially interested
in the question of whether this fits into any existing working groups
(whether in the security area or otherwise) or would necessitate a new
group, such as a reopening of MSEC. Of course, any helpful feedback is
welcomed.

The draft and associated GitHub repo can be found here:

https://datatracker.ietf.org/doc/draft-krose-multicast-security/
https://github.com/squarooticus/draft-krose-multicast-security

Thanks,
Kyle (and Jake)

--000000000000083cf605c8ec9ec8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">Sec=
dispatch participants:<br><br>Across two SDOs (IETF and W3C), multiple part=
ies have begun to look into how to make multicast safe within the Web secur=
ity model. As part of this effort, Jake Holland and I have been putting tog=
ether a security and privacy considerations document for multicast, akin to=
 that for WebRTC (RFC 8826), that attempts to identify where multicast inhe=
rently differs from unicast in usage patterns and protocol constraints, and=
 then lays out a set of requirements for multicast protocols that we believ=
e would allow them to fit within the spirit of the Web security model. From=
 the abstract:<br><br>&gt; Interdomain multicast has unique potential to so=
lve delivery scalability for popular content, but it carries a set of secur=
ity and privacy issues that differ from those in unicast delivery. This doc=
ument analyzes the security threats unique to multicast-based delivery for =
Internet and Web traffic under the Internet and Web threat models.<br><br>W=
e come to secdispatch primarily with the aim of finding a venue within the =
IETF in which to continue to flesh out and improve this work. Considering t=
he potential security and privacy implications for browsers of introducing =
a model for content delivery that in many ways fundamentally differs from t=
hat provided by existing unicast transports, we are especially interested i=
n the question of whether this fits into any existing working groups (wheth=
er in the security area or otherwise) or would necessitate a new group, suc=
h as a reopening of MSEC. Of course, any helpful feedback is welcomed.</div=
><div class=3D"gmail_default" style=3D"font-size:small"><br></div><div clas=
s=3D"gmail_default" style=3D"font-size:small">The draft and associated GitH=
ub repo can be found here:<br></div><div class=3D"gmail_default" style=3D"f=
ont-size:small"><br></div><div class=3D"gmail_default" style=3D"font-size:s=
mall"><a href=3D"https://datatracker.ietf.org/doc/draft-krose-multicast-sec=
urity/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-krose-mult=
icast-security/</a></div><div class=3D"gmail_default" style=3D"font-size:sm=
all"><a href=3D"https://github.com/squarooticus/draft-krose-multicast-secur=
ity" target=3D"_blank">https://github.com/squarooticus/draft-krose-multicas=
t-security</a></div><div class=3D"gmail_default" style=3D"font-size:small">=
<br></div><div class=3D"gmail_default" style=3D"font-size:small">Thanks,<br=
></div><div class=3D"gmail_default" style=3D"font-size:small">Kyle (and Jak=
e)<br></div></div>

--000000000000083cf605c8ec9ec8--

