Re: [TLS] Implicit ACKs in post-handshake
Eric Rescorla <ekr@rtfm.com> Thu, 23 April 2020 21:26 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAF083A1405 for <tls@ietfa.amsl.com>; Thu, 23 Apr 2020 14:26:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NzFXV4VxaTgK for <tls@ietfa.amsl.com>; Thu, 23 Apr 2020 14:26:26 -0700 (PDT)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 041683A13F5 for <tls@ietf.org>; Thu, 23 Apr 2020 14:26:26 -0700 (PDT)
Received: by mail-lj1-x232.google.com with SMTP id b2so7783843ljp.4 for <tls@ietf.org>; Thu, 23 Apr 2020 14:26:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=i+dYmDCVkmUuJ3s5EDAnuiWofHMMKb0g6VflP0K0BzA=; b=akGYmeHagXof2dISIWSlD+SMNdYe5xOSMc/et9BFeAYBhaO897pWjMnJsLP823QcTl BOZ4tVhVK6Mgk/ShjjYSoDPHpZu7n/mr92JJyDbIRI14CzLTXK4BTm2W4RV0AFeakfNw xAQ8chaWc5dEaVlIR6XCX2bGlgwPGqwEPUxr4BpzFaum+kB7Zgw2gRwwOUPBwY1602Rx XS2xzULR4ZGjWv65ZQteoYbKqTgZnEvz9hNRndWZgk57Ts9hIaGVGlWeSklnSw4El8uo 38kGurN03c86gaCLpt/YuGN2WbVnILwYh8iSiHsi3ElnT1AK/N2TCttENtggmy7y6smf Pq6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=i+dYmDCVkmUuJ3s5EDAnuiWofHMMKb0g6VflP0K0BzA=; b=SiGpwxXoLo+aiLdoW4bEChZCc/RX8HPvFRt7n7iSxiAn9MeYaPljCYpAIaM43tiS1l GHghJgd69ghG5/ApYg3O+Drrh0Sc5PZr710wwlvtbsxXNJQGaCmfX/jhSOoWwcyHSOi5 guScW+6mismGtrg1LqsGku8cFMWWyhYsQVvW5Z9Gq3nmQZ3fgxkI+1nm5frAK33mJa/I AYsGu1J9G+CRj+cdKKkil94LsUfwaeczaZw2drW9wKhRZ7fc1q4G03K5KdqRtw1qU4oZ 9fXWQt3BHZKOO3oi6pXGr8LL9MVY/4FCBiZ2t0VlrdsXVb317suOiEPoQ0+aUkKPc2Pv fbRg==
X-Gm-Message-State: AGi0Puar6rmSiHkSM28yc8EourIfC78hNO3nMND9iHovErBpBjWowlhh F4Nh9mgDtMTySqJS3iXWULdPY9C4xvz80RzoSg0IOw==
X-Google-Smtp-Source: APiQypLO+xttkruTqDexP3SRzziRHgQOpeKj+Lfe4hg0WLR37yiBjI47xR6id3eRnJhOqW25ZZ9RfU3JX0lGIV3Coqw=
X-Received: by 2002:a2e:b0ee:: with SMTP id h14mr3748293ljl.35.1587677184257; Thu, 23 Apr 2020 14:26:24 -0700 (PDT)
MIME-Version: 1.0
References: <CABcZeBOjajk44mASbVZ1O-gYyh54B-TsHxV2iVaAXdqUgmB5kQ@mail.gmail.com> <AM6PR08MB331828BC62552C177CEE4D369BD30@AM6PR08MB3318.eurprd08.prod.outlook.com>
In-Reply-To: <AM6PR08MB331828BC62552C177CEE4D369BD30@AM6PR08MB3318.eurprd08.prod.outlook.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 23 Apr 2020 14:25:48 -0700
Message-ID: <CABcZeBNcQm3Vr=6QexvXH=RxS+s-wFGJHLg0x3BiaDYKbtCn0w@mail.gmail.com>
To: Hanno Becker <Hanno.Becker@arm.com>
Cc: "<tls@ietf.org>" <tls@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000096029a05a3fbe63e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/SsCPNmL0WUdaEsi91ZJTAQn13ko>
Subject: Re: [TLS] Implicit ACKs in post-handshake
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2020 21:26:30 -0000
I don't feel strongly about it, and not changing anything is certainly easier. It just felt out of place and I wanted to flag it. -Ekr On Thu, Apr 23, 2020 at 2:23 PM Hanno Becker <Hanno.Becker@arm.com> wrote: > Hi Ekr, > > Do you see some simplifications resulting from this? > > On first thought I'd think that since implementations are already able to > handle implicit > ACKs, it doesn't come at extra cost to allow their use for post-HS > client-auth, too. > > In contrast, it seems that if the client's Certificate message no longer > implicitly acknowledges the CertificateRequest, there's need to explicitly > explain the state machine transition upon receipt of the Certificate > message > prior to receiving an ACK for the CertificateRequest. > > Overall I feel that there is no need for change here, but I might miss > something. > > Best, > Hanno > > ------------------------------ > *From:* TLS <tls-bounces@ietf.org> on behalf of Eric Rescorla < > ekr@rtfm.com> > *Sent:* Thursday, April 23, 2020 9:48 PM > *To:* <tls@ietf.org> <tls@ietf.org> > *Subject:* [TLS] Implicit ACKs in post-handshake > > Hi folks, > > As I was going through the ACK clarifications, I noticed that we were > requiring explicit ACKs for everything other than post-handshake > client auth, where we allow implicit ACK. This obviously works, > but given that (1) we expect explicit ACK from the client if there > is a user-consent delay and (2) it's the only one, what would people > think of using implicit ACKs only for the handshake itself. > > -Ekr > > > IMPORTANT NOTICE: The contents of this email and any attachments are > confidential and may also be privileged. If you are not the intended > recipient, please notify the sender immediately and do not disclose the > contents to any other person, use it for any purpose, or store or copy the > information in any medium. Thank you. >
- [TLS] Implicit ACKs in post-handshake Eric Rescorla
- Re: [TLS] Implicit ACKs in post-handshake Hanno Becker
- Re: [TLS] Implicit ACKs in post-handshake Eric Rescorla
- Re: [TLS] Implicit ACKs in post-handshake Martin Thomson
- Re: [TLS] Implicit ACKs in post-handshake Eric Rescorla
- Re: [TLS] Implicit ACKs in post-handshake Christopher Wood