[TLS] Intolerance for delegated credentials

Martin Thomson <mt@lowentropy.net> Tue, 24 August 2021 05:13 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7F0E3A0D7E for <tls@ietfa.amsl.com>; Mon, 23 Aug 2021 22:13:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=WMG86n7e; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=F7TO+GoE
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7GHb_2TdJvWd for <tls@ietfa.amsl.com>; Mon, 23 Aug 2021 22:13:16 -0700 (PDT)
Received: from wout5-smtp.messagingengine.com (wout5-smtp.messagingengine.com [64.147.123.21]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 481CA3A0D74 for <tls@ietf.org>; Mon, 23 Aug 2021 22:13:16 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.west.internal (Postfix) with ESMTP id 7430F3200AF1 for <tls@ietf.org>; Tue, 24 Aug 2021 01:13:13 -0400 (EDT)
Received: from imap41 ([10.202.2.91]) by compute5.internal (MEProxy); Tue, 24 Aug 2021 01:13:13 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=mime-version:message-id:date:from:to:subject:content-type; s= fm3; bh=3H+IoD0E9MO9iQj/wVtUvXEtQJl4cWf2LPGapAtf5ps=; b=WMG86n7e 9YosNi3pUri5cq3AWk7HejIywXe1eKiMkdfFnMY3oZBFlxyh6BrPB9hAPCLmdN2K CX+6/oAnKpKddSz9hO+KXgTw9dREjy7kHDhC9lhyLcHzuKjfx/ISxc5ojrNNPJrd 2eGOCWCX5hMHorc7BHk+nvjTdpZ+ic0+WCJrT65L5O6E/ciLCyz/Ph8yuXMc9wuk wyaMdcyT9pHQ8Od9YKsZhc3tvRr8XQ+abuNfr+6nAz23xvr5+e13YlfsZ/CQ5GiR Bo7QEoc+Vqn6kDkp+soEDoQhffaX0Pjv6oOfAPU+qj945jBBjC45NxFlg/zJcCz2 Pm3QqzLI3XqotA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=3H+IoD0E9MO9iQj/wVtUvXEtQJl4c Wf2LPGapAtf5ps=; b=F7TO+GoEQmNCRkSW2O2Xz4zRXS75BShsYnuv1Bhmgv9e2 EP2288EFR9yGptSiq8o9e4bpmxu9ZLW9Pw6h92pD10BgmVsm21B299rqM43o6H/q mhkDGVqUd6snUQKl6fN/qS0xTICzNbVlharEYlkXKluG+3qsIw0/ukdRv8BHCBcX PPWySWAwI6gR5I3LoBim/lDCdMbGmlUAcTIKKm4YbIrJHC/I3NgC2f2sexPN/RaD 1mibqOwLeMUEOdbm6hVpx4R8B4lqJuB6aR2cX0mdE2/irRPhAVV1P6242/dWhw8b hwIJLbLLxq/oHFeDD2KGNRBEjZcPRccqw6pfkR7JA==
X-ME-Sender: <xms:6H8kYRi5pO-5KVkZNUtkKbFm39IsSI1yNuap6kGrWx0vg3jbW-8gGg> <xme:6H8kYWB7hMGfrBd4e2cD9CvKsYG5RzPRPtUFPd-NEnHwyIrzkd3uzxuRzbvdUB4W5 wC9VzWddUDOCd1BJbg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddruddtiedgleduucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefofgggkfffhffvufgtsehttdertd erredtnecuhfhrohhmpedfofgrrhhtihhnucfvhhhomhhsohhnfdcuoehmtheslhhofigv nhhtrhhophihrdhnvghtqeenucggtffrrghtthgvrhhnpeevgfdutdfgjeefudeuheekhe ekudeugeehfeegveekkeegleevveffueduffehheenucevlhhushhtvghrufhiiigvpedt necurfgrrhgrmhepmhgrihhlfhhrohhmpehmtheslhhofigvnhhtrhhophihrdhnvght
X-ME-Proxy: <xmx:6H8kYREgIWDTZMHeriUCqzaKHrRyfECGB8ZXFU9IWvpCl66s0gjX9Q> <xmx:6H8kYWRZeUPzfg59TfeJploSdbB5ilYeBtbTXJVjf6xw2xfzoAygUA> <xmx:6H8kYeyrbh3_BgA6ex5htF4wp_UD1oRpYcXOHRl-A5_v2iCeDfRMpw> <xmx:6X8kYd8u-mfYUKFDyKavScwgvkrs8xOq1TxkRNIpQcSsIfUAv27PFQ>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 935953C0EB8; Tue, 24 Aug 2021 01:13:12 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.5.0-alpha0-1118-g75eff666e5-fm-20210816.002-g75eff666
Mime-Version: 1.0
Message-Id: <aa5946a1-8309-42d2-837c-93b8dc35cc67@www.fastmail.com>
Date: Tue, 24 Aug 2021 15:12:44 +1000
From: Martin Thomson <mt@lowentropy.net>
To: tls@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/16h0wmvvcL0pP9UM-vIlRDAqjQw>
Subject: [TLS] Intolerance for delegated credentials
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Aug 2021 05:13:23 -0000

Hey,

We've found a server that is intolerant of our offer to use delegated credentials.  This seems to run a modern nginx and TLS 1.3, but it is not producing the same handshake keys as us, so I can't tell if it supports the extension or not (as the EncryptedExtensions message is indecipherable).  The TLS stack is unknown, but as it supports ARIA, CAMELLIA, and CCM_8 (!) that might narrow things down a little.

Is anyone deploying delegated credentials that I'm not aware of?  Or has the codepoint assignment (34) run afoul of an experiment we're not aware of?