Re: [TLS] TLSrenego - current summary of semantics and possibilities

Nicolas Williams <Nicolas.Williams@sun.com> Tue, 10 November 2009 20:43 UTC

Return-Path: <Nicolas.Williams@sun.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4E47D3A68E7 for <tls@core3.amsl.com>; Tue, 10 Nov 2009 12:43:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.028
X-Spam-Level:
X-Spam-Status: No, score=-6.028 tagged_above=-999 required=5 tests=[AWL=0.018, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o42csXrXM9Pi for <tls@core3.amsl.com>; Tue, 10 Nov 2009 12:43:54 -0800 (PST)
Received: from brmea-mail-2.sun.com (brmea-mail-2.Sun.COM [192.18.98.43]) by core3.amsl.com (Postfix) with ESMTP id 8F6953A68AF for <tls@ietf.org>; Tue, 10 Nov 2009 12:43:53 -0800 (PST)
Received: from dm-central-02.central.sun.com ([129.147.62.5]) by brmea-mail-2.sun.com (8.13.6+Sun/8.12.9) with ESMTP id nAAKiKYx006953 for <tls@ietf.org>; Tue, 10 Nov 2009 20:44:21 GMT
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104]) by dm-central-02.central.sun.com (8.13.8+Sun/8.13.8/ENSMAIL, v2.2) with ESMTP id nAAKiKvn060866 for <tls@ietf.org>; Tue, 10 Nov 2009 13:44:20 -0700 (MST)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1]) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3) with ESMTP id nAAKWlWO012744; Tue, 10 Nov 2009 14:32:47 -0600 (CST)
Received: (from nw141292@localhost) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3/Submit) id nAAKWkTT012743; Tue, 10 Nov 2009 14:32:46 -0600 (CST)
X-Authentication-Warning: binky.Central.Sun.COM: nw141292 set sender to Nicolas.Williams@sun.com using -f
Date: Tue, 10 Nov 2009 14:32:46 -0600
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Steve Dispensa <dispensa@phonefactor.com>
Message-ID: <20091110203245.GB1105@Sun.COM>
References: <200911101928.nAAJSGjI020038@fs4113.wdf.sap.corp> <C71F1D17.251AC%dispensa@phonefactor.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <C71F1D17.251AC%dispensa@phonefactor.com>
User-Agent: Mutt/1.5.7i
Cc: tls@ietf.org
Subject: Re: [TLS] TLSrenego - current summary of semantics and possibilities
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2009 20:43:55 -0000

On Tue, Nov 10, 2009 at 01:37:27PM -0600, Steve Dispensa wrote:
> On 11/10/09 1:28 PM, "Martin Rex" <mrex@sap.com> wrote:
> >   - if a TLS client (any protocol version, including SSLv3) performs
> >     renegotiation (i.e. sends a ClientHello over an established
> >     TLS session with a ciphersuite other than TLS_NULL_WITH_NULL_NULL),
> >     then it SHOULD always and unconditionally use the TLS extension
> >     Renegotiation_Info containing the verify_data of the client.finished
> >     handshake message from the active TLS session,
> >     The TLS client should do that even when it did not send the
> >     TLS extension Renegotiation_Info with and empty extension data
> >     in the initial TLS handshake on a connection!
> > 
> >     Lacking application level re-connect provisions for forward-incompatible
> >     SSL/TLS servers, a TLS client might not want to sent the TLS extension
> >     in the initial ClientHello of a connection.
> 
> This was discussed a bit at the Sept. 29 meeting. I had originally suggested
> that the extension need not be present during initial negotiations at all,
> but it was pointed out that network management systems might want to
> inventory patched clients and servers.

I guess we'll see whether the need to interop with broken servers (which
are probably broken forever, and therefore vulnerable forever) is
important enough that implementors will have to include a knob for
whether to send this extension on initial negotiations.  I consider the
fact that it will break such broken servers a feature, but one must be
realistic also.

Nico
--