[kitten] Review of draft-ietf-kitten-tls-channel-bindings-for-tls13-01

Nico Williams <nico@cryptonector.com> Fri, 26 February 2021 21:04 UTC

Return-Path: <nico@cryptonector.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B1D13A0962 for <kitten@ietfa.amsl.com>; Fri, 26 Feb 2021 13:04:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.1
X-Spam-Level:
X-Spam-Status: No, score=-7.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cryptonector.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JjKps-a-cReX for <kitten@ietfa.amsl.com>; Fri, 26 Feb 2021 13:04:21 -0800 (PST)
Received: from cross.elm.relay.mailchannels.net (cross.elm.relay.mailchannels.net [23.83.212.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AACC83A095F for <kitten@ietf.org>; Fri, 26 Feb 2021 13:04:07 -0800 (PST)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id E297D781E0C; Fri, 26 Feb 2021 21:04:05 +0000 (UTC)
Received: from pdx1-sub0-mail-a11.g.dreamhost.com (100-96-10-164.trex.outbound.svc.cluster.local [100.96.10.164]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id 77AA4781E5D; Fri, 26 Feb 2021 21:04:05 +0000 (UTC)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from pdx1-sub0-mail-a11.g.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384) by 100.96.10.164 (trex/6.0.2); Fri, 26 Feb 2021 21:04:05 +0000
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|nico@cryptonector.com
X-MailChannels-Auth-Id: dreamhost
X-Wipe-Quick: 4cf3c18f017a6458_1614373445711_1855281771
X-MC-Loop-Signature: 1614373445711:242181517
X-MC-Ingress-Time: 1614373445711
Received: from pdx1-sub0-mail-a11.g.dreamhost.com (localhost [127.0.0.1]) by pdx1-sub0-mail-a11.g.dreamhost.com (Postfix) with ESMTP id 344297EF76; Fri, 26 Feb 2021 13:04:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h=date :from:to:subject:message-id:mime-version:content-type; s= cryptonector.com; bh=vNFaBeQZZNNQMGnJDIJLkYMhxpY=; b=agN+BqzdEIC D9oJle4IdJqVu38uP+UnuGCFXWKiDc+ZTYbyZ9JrhjkRXBsy6Hotx+o7Ku5zOtt0 yChQLNQw0LsqnbvfM9KKg/eZUu/R87SxByVttvQzmLc70I78EmmRjNtYZ2vOM12r WpJmqRSuS+Pb4egXH7cBI/MPRD+LKp7k=
Received: from localhost (unknown [24.28.108.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: nico@cryptonector.com) by pdx1-sub0-mail-a11.g.dreamhost.com (Postfix) with ESMTPSA id C8E457EF6A; Fri, 26 Feb 2021 13:04:04 -0800 (PST)
Date: Fri, 26 Feb 2021 15:04:02 -0600
X-DH-BACKEND: pdx1-sub0-mail-a11
From: Nico Williams <nico@cryptonector.com>
To: kitten@ietf.org
Message-ID: <20210226210401.GA13511@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
User-Agent: Mutt/1.9.4 (2018-02-28)
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/0cTcZs45FdX3q2TwCn_Gdg8CKYQ>
Subject: [kitten] Review of draft-ietf-kitten-tls-channel-bindings-for-tls13-01
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2021 21:04:23 -0000

I have reviewed draft-ietf-kitten-tls-channel-bindings-for-tls13-01.

My only comment, besides a thank you, is this:

 - Section 1, first sentence
   
   | The channel binding types defined in [RFC5929] were found to be
   | vulnerable to the "triple handshake vulnerability" ...

   I believe that's specifically about tls-unique and
   tls-unique-for-telnet, but not tls-server-end-point.

   A slight rephrasing would be useful, as there is no need to give the
   wrong impression about tls-server-end-point.

Thanks,

Nico
--