[TLS] Exported Authenticators proposed updates

Nick Sullivan <nicholas.sullivan@gmail.com> Tue, 13 June 2017 00:32 UTC

Return-Path: <nicholas.sullivan@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A512128CF0 for <tls@ietfa.amsl.com>; Mon, 12 Jun 2017 17:32:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GRnYqlvvnbXk for <tls@ietfa.amsl.com>; Mon, 12 Jun 2017 17:32:27 -0700 (PDT)
Received: from mail-ot0-x22d.google.com (mail-ot0-x22d.google.com [IPv6:2607:f8b0:4003:c0f::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5FD1312778E for <TLS@ietf.org>; Mon, 12 Jun 2017 17:32:24 -0700 (PDT)
Received: by mail-ot0-x22d.google.com with SMTP id i31so77153250ota.3 for <TLS@ietf.org>; Mon, 12 Jun 2017 17:32:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=IzF7W6BS7T17r2RPl9rXEE/MBpdC3yRLyN4uIuBkcxQ=; b=Hhv4M0RgaIDKqjth7yQl9bmTFqBA4Uw0FriSSr0Ge9iM0OaWF7ebTCTtHOpIbnVDLk EoBlmQDu2+iDDsZWwy7Z4AzQQ4HPfdDTSlvQmaJFAB/a4Q05UGTM5rK2dDCa1VeIxaxO 6HJgIvqH1+Tgwz7J86rP/PFCl/X22wF1SJStaOHex3O9N9nG8BzsYjmdWZ2bOVOh9MSd WR/6SKxINpcahu2r2hnFz/cKkWBsHe/Qa9R6tPNUD1EOcpWc2bzHZhlr2uABb7RBhWMy 5x/FjoVed1G66DgScCUsnPHYlUdZiHJdJRmK/mJXQzYhdmwJWN0etjaJEpOXjowlLkX4 FuNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=IzF7W6BS7T17r2RPl9rXEE/MBpdC3yRLyN4uIuBkcxQ=; b=bQKGI24cFtR+Er7lx1LlXxyM9KwLPE+4xxrskPCPIW5byzBxVPpqAv/W83QnQBc3hb TDcagadfhXRIFWbbPdrskIzmcg9s+A8JetVUuoylG4W3xa+p+mwb5aNYVSflnpZFI36p gb1wBc0YU66/dlG2JEhhLi2Vj7ozq+hjnWlxtOjEoMNwblt7yRaGq9I0zQr+eNTWlpri IZJBufZr54oXqBqpWTOuv3KEPerHd0hXhGzgUqR8qak8n7cjwFuFyZkIvxQNChPDF+7D DtJm41UhUgminI7mYvMTEQxlv7Hfx0GwxKULiVdd/LVpkR2//VaczkqSoD42EeCxP8mr PPzQ==
X-Gm-Message-State: AODbwcCCKh/2OnL5JRQjpSQAln1wwBSfaKEyCXRg/qT8PlZeS7MTmbVh 7jG3G44H2tFVL0qsIeuEj9RmfcI/vA==
X-Received: by 10.157.43.117 with SMTP id f50mr27392222otd.56.1497313943500; Mon, 12 Jun 2017 17:32:23 -0700 (PDT)
MIME-Version: 1.0
From: Nick Sullivan <nicholas.sullivan@gmail.com>
Date: Tue, 13 Jun 2017 00:32:12 +0000
Message-ID: <CAOjisRzgguV1XtRSY0mxYgptAyWY2yDJ4tfF382OW2AW_ngWcw@mail.gmail.com>
To: "tls@ietf.org" <TLS@ietf.org>
Content-Type: multipart/alternative; boundary="001a113eddccb83c790551cc91b3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/OuSdOXGTxVShtC6_YMqC8bgtlZQ>
Subject: [TLS] Exported Authenticators proposed updates
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jun 2017 00:32:29 -0000

All,

I've collected a few changes that help clarify some ambiguities brought up
on the list and during implementation of the draft. These changes are laid
out as the following PRs in Github:

Restrict the Certificate type to standard X.509 certificates.
https://github.com/grittygrease/tls-exported-authenticator/pull/20

Relax requirement for the certificate_request_context to be unique, clarify
the benefits of doing so.
https://github.com/grittygrease/tls-exported-authenticator/pull/18

Be more explicit about how signature schemes are chosen and supported.
https://github.com/grittygrease/tls-exported-authenticator/pull/18

Modify handshake context to be asymmetrical with respect to client and
server.
https://github.com/grittygrease/tls-exported-authenticator/pull/15
<https://github.com/grittygrease/tls-exported-authenticator/pull/16>

Let me know if there are any objections. If there are no comments I'll
merge the changes and publish a new draft.

Nick