[kitten] Review of draft-ietf-kitten-tls-channel-bindings-for-tls13-01
Nico Williams <nico@cryptonector.com> Fri, 26 February 2021 21:04 UTC
Return-Path: <nico@cryptonector.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 1B1D13A0962
for <kitten@ietfa.amsl.com>; Fri, 26 Feb 2021 13:04:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.1
X-Spam-Level:
X-Spam-Status: No, score=-7.1 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5,
RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001,
URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
header.d=cryptonector.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id JjKps-a-cReX for <kitten@ietfa.amsl.com>;
Fri, 26 Feb 2021 13:04:21 -0800 (PST)
Received: from cross.elm.relay.mailchannels.net
(cross.elm.relay.mailchannels.net [23.83.212.46])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id AACC83A095F
for <kitten@ietf.org>; Fri, 26 Feb 2021 13:04:07 -0800 (PST)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from relay.mailchannels.net (localhost [127.0.0.1])
by relay.mailchannels.net (Postfix) with ESMTP id E297D781E0C;
Fri, 26 Feb 2021 21:04:05 +0000 (UTC)
Received: from pdx1-sub0-mail-a11.g.dreamhost.com
(100-96-10-164.trex.outbound.svc.cluster.local [100.96.10.164])
(Authenticated sender: dreamhost)
by relay.mailchannels.net (Postfix) with ESMTPA id 77AA4781E5D;
Fri, 26 Feb 2021 21:04:05 +0000 (UTC)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from pdx1-sub0-mail-a11.g.dreamhost.com (pop.dreamhost.com
[64.90.62.162])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384)
by 100.96.10.164 (trex/6.0.2); Fri, 26 Feb 2021 21:04:05 +0000
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|nico@cryptonector.com
X-MailChannels-Auth-Id: dreamhost
X-Wipe-Quick: 4cf3c18f017a6458_1614373445711_1855281771
X-MC-Loop-Signature: 1614373445711:242181517
X-MC-Ingress-Time: 1614373445711
Received: from pdx1-sub0-mail-a11.g.dreamhost.com (localhost [127.0.0.1])
by pdx1-sub0-mail-a11.g.dreamhost.com (Postfix) with ESMTP id 344297EF76;
Fri, 26 Feb 2021 13:04:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h=date
:from:to:subject:message-id:mime-version:content-type; s=
cryptonector.com; bh=vNFaBeQZZNNQMGnJDIJLkYMhxpY=; b=agN+BqzdEIC
D9oJle4IdJqVu38uP+UnuGCFXWKiDc+ZTYbyZ9JrhjkRXBsy6Hotx+o7Ku5zOtt0
yChQLNQw0LsqnbvfM9KKg/eZUu/R87SxByVttvQzmLc70I78EmmRjNtYZ2vOM12r
WpJmqRSuS+Pb4egXH7cBI/MPRD+LKp7k=
Received: from localhost (unknown [24.28.108.183])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
(Authenticated sender: nico@cryptonector.com)
by pdx1-sub0-mail-a11.g.dreamhost.com (Postfix) with ESMTPSA id C8E457EF6A;
Fri, 26 Feb 2021 13:04:04 -0800 (PST)
Date: Fri, 26 Feb 2021 15:04:02 -0600
X-DH-BACKEND: pdx1-sub0-mail-a11
From: Nico Williams <nico@cryptonector.com>
To: kitten@ietf.org
Message-ID: <20210226210401.GA13511@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.9.4 (2018-02-28)
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/0cTcZs45FdX3q2TwCn_Gdg8CKYQ>
Subject: [kitten] Review of
draft-ietf-kitten-tls-channel-bindings-for-tls13-01
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>,
<mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>,
<mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2021 21:04:23 -0000
I have reviewed draft-ietf-kitten-tls-channel-bindings-for-tls13-01. My only comment, besides a thank you, is this: - Section 1, first sentence | The channel binding types defined in [RFC5929] were found to be | vulnerable to the "triple handshake vulnerability" ... I believe that's specifically about tls-unique and tls-unique-for-telnet, but not tls-server-end-point. A slight rephrasing would be useful, as there is no need to give the wrong impression about tls-server-end-point. Thanks, Nico --
- [kitten] Review of draft-ietf-kitten-tls-channel-… Nico Williams
- Re: [kitten] Review of draft-ietf-kitten-tls-chan… Sam Whited
- Re: [kitten] Review of draft-ietf-kitten-tls-chan… Sam Whited
- Re: [kitten] Review of draft-ietf-kitten-tls-chan… Nico Williams
- Re: [kitten] Review of draft-ietf-kitten-tls-chan… Robbie Harwood
- Re: [kitten] Review of draft-ietf-kitten-tls-chan… Sam Whited