[core] Security (again)

"Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com> Sun, 18 December 2011 10:47 UTC

Return-Path: <hannes.tschofenig@nsn.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E43B521F8432 for <core@ietfa.amsl.com>; Sun, 18 Dec 2011 02:47:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.819
X-Spam-Level:
X-Spam-Status: No, score=-105.819 tagged_above=-999 required=5 tests=[AWL=0.780, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JE-4hlbKtAno for <core@ietfa.amsl.com>; Sun, 18 Dec 2011 02:47:21 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) by ietfa.amsl.com (Postfix) with ESMTP id 2D14121F842F for <core@ietf.org>; Sun, 18 Dec 2011 02:47:21 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id pBIAlKX4004396 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <core@ietf.org>; Sun, 18 Dec 2011 11:47:20 +0100
Received: from DEMUEXC048.nsn-intra.net ([10.159.32.94]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id pBIAlJkB029326 for <core@ietf.org>; Sun, 18 Dec 2011 11:47:20 +0100
Received: from FIESEXC035.nsn-intra.net ([10.159.0.25]) by DEMUEXC048.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675); Sun, 18 Dec 2011 11:45:30 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
x-cr-puzzleid: {C92536A1-4D08-4685-A219-1F61D281C20A}
x-cr-hashedpuzzle: BJue CKR2 EIRW EVpN GR7z II3z If9A I2og JLOO JTqs Jvqp Karu Kozc K9Ch LtxA L+KZ; 1; YwBvAHIAZQBAAGkAZQB0AGYALgBvAHIAZwA=; Sosha1_v1; 7; {C92536A1-4D08-4685-A219-1F61D281C20A}; aABhAG4AbgBlAHMALgB0AHMAYwBoAG8AZgBlAG4AaQBnAEAAbgBzAG4ALgBjAG8AbQA=; Sun, 18 Dec 2011 10:47:20 GMT; UwBlAGMAdQByAGkAdAB5ACAAKABhAGcAYQBpAG4AKQA=
Content-class: urn:content-classes:message
Date: Sun, 18 Dec 2011 12:47:20 +0200
Message-ID: <999913AB42CC9341B05A99BBF358718DE38076@FIESEXC035.nsn-intra.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Security (again)
Thread-Index: Acy9cmqzDnfltlZ+QZCGqphB/3V1cg==
From: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
To: core@ietf.org
X-OriginalArrivalTime: 18 Dec 2011 10:45:30.0349 (UTC) FILETIME=[294941D0:01CCBD72]
X-Mailman-Approved-At: Sun, 18 Dec 2011 03:57:48 -0800
Subject: [core] Security (again)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/core>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Dec 2011 10:47:22 -0000

Hi all,

since you may not be subscribed to the TLS working group mailing list I
thought I should share some information about ongoing activities with
relevance to you. 

During the Taipei IETF TLS meeting to remove the functionality of
conveying a public key fingerprint from draft-wouters-tls-oob-pubkey. I
did that already during that meeting with the submission of
http://tools.ietf.org/html/draft-wouters-tls-oob-pubkey-02. I had posted
a mail about this the currently ongoing consensus call (see
http://www.ietf.org/mail-archive/web/tls/current/msg08290.html). 

The removed functionality is not gone but rather part of a different
document, namely
http://tools.ietf.org/html/draft-ietf-tls-cached-info-10

>From the abstract of the draft:
"
   This extension allows the TLS client to inform a
   server of cached information from previous TLS handshakes, allowing
   the server to omit sending cached static information to the client
   during the TLS handshake protocol exchange.
"

This functionality is useful for the constrained environments you guys
are working on.

Receiving feedback from this community would be great. If you get
confused by all this TLS stuff drop me a mail. 

Ciao
Hannes