Re: [TLS] Issue 49: Finished.verify length
Eric Rescorla <ekr@networkresonance.com> Sun, 16 September 2007 17:22 UTC
Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IWxp0-00030c-06; Sun, 16 Sep 2007 13:22:14 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IWxoy-00030G-8V for tls@ietf.org; Sun, 16 Sep 2007 13:22:12 -0400
Received: from [74.95.2.169] (helo=delta.rtfm.com) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IWxox-0007HO-Pc for tls@ietf.org; Sun, 16 Sep 2007 13:22:12 -0400
Received: from delta.rtfm.com (localhost.rtfm.com [127.0.0.1]) by delta.rtfm.com (Postfix) with ESMTP id 57FF033C21; Sun, 16 Sep 2007 10:18:35 -0700 (PDT)
Date: Sun, 16 Sep 2007 10:18:34 -0700
From: Eric Rescorla <ekr@networkresonance.com>
To: Pasi.Eronen@nokia.com
Subject: Re: [TLS] Issue 49: Finished.verify length
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F2404966DF0@esebe105.NOE.Nokia.com>
References: <20070914090853.GA20702@tau.invalid> <B356D8F434D20B40A8CEDAEC305A1F2404937712@esebe105.NOE.Nokia.com> <20070914120310.GA29073@tau.invalid> <B356D8F434D20B40A8CEDAEC305A1F2404937802@esebe105.NOE.Nokia.com> <20070914141809.2439533C21@delta.rtfm.com> <B356D8F434D20B40A8CEDAEC305A1F2404966D3F@esebe105.NOE.Nokia.com> <20070914183633.6B09F33C21@delta.rtfm.com> <B356D8F434D20B40A8CEDAEC305A1F2404966DF0@esebe105.NOE.Nokia.com>
User-Agent: Wanderlust/2.14.0 (Africa) Emacs/21.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20070916171835.57FF033C21@delta.rtfm.com>
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 3e15cc4fdc61d7bce84032741d11c8e5
Cc: tls@ietf.org
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org
At Sun, 16 Sep 2007 11:36:20 +0300, <Pasi.Eronen@nokia.com> wrote: > > Eric Rescorla wrote: > > > OK, I see where you're going with this, but I'm not sure it > > requires us to do anything now. If we're confronted with such a > > cipher suite, we can just have the document Update TLS 1.2, since > > it would only be applicable to that new cipher suite. I don't > > think this needs a version revision. > > > > Unless you're proposing making this a variable length vector, > > whcih seems like a bad idea, since it should be defined in the > > cipher suite. > > Yes, the length should be defined by the cipher suite, but I'd like > to avoid the "Updates: TLS 1.2" part (in general, ciphersuites > shouldn't need that). And we could avoid that by changing the wire > encoding to a variable-length vector now, i.e. change > > struct { > opaque verify_data[12]; > } Finished; > > to > > struct { > opaque verify_data<0..255>; > } Finished; > > (And say that the verify_data length is 12 octets unless explicitly > specified otherwise by the ciphersuite) Well, I don't think changing the encoding is needed. The verify_data is the only thing in the Finished message so it's already implicitly encoded. If we want to allow this to change length without doing an Update, then why not change it to: struct { opaque verify_data[SecurityParameters.finished_length]; } Finished; This leaves a hole but doesn't require changing the wire encoding. That said, I'd sort of like to discourage changing the length without good reason, so I'd actually like the first cipher suite to do this to have to Update: TLS 1.2. However, using the technique above, we could make this cahnge later without having to impact implemenations that didn't support the new cipher suite. -Ekr _______________________________________________ TLS mailing list TLS@lists.ietf.org https://www1.ietf.org/mailman/listinfo/tls
- [TLS] Issue 49: Finished.verify length Eric Rescorla
- Re: [TLS] Issue 49: Finished.verify length Mike
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- Re: [TLS] Issue 49: Finished.verify length Mike
- Re: [TLS] Issue 49: Finished.verify length Bodo Moeller
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Bodo Moeller
- Re: [TLS] Issue 49: Finished.verify length Bodo Moeller
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Eric Rescorla
- RE: [TLS] Issue 49: Finished.verify length Pasi.Eronen
- Re: [TLS] Issue 49: Finished.verify length Russ Housley